Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.00",
%%%     date            = "23 September 2019",
%%%     time            = "11:29:18 MDT",
%%%     filename        = "computsecur1990.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "36613 47079 161262 1783107",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 1990--1999.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            http://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.00, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             1990 ( 119)    1994 ( 121)    1998 ( 299)
%%%                             1991 ( 121)    1995 ( 362)    1999 ( 346)
%%%                             1992 ( 194)    1996 ( 307)
%%%                             1993 ( 129)    1997 ( 315)
%%%
%%%                             Article:       2313
%%%
%%%                             Total entries: 2313
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Anonymous:1990:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090147L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "2--3",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090148M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "4--11",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090149N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1990:PSI,
  author =       "Charles Cresson Wood",
  title =        "Principles of secure information systems design",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "13--24",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090150R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1990:CVC,
  author =       "Bernard P. Zajac",
  title =        "Computer viruses: Can they be prevented?",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "25--31",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090151I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Klopp:1990:SVC,
  author =       "Charlotte Klopp",
  title =        "Software vendors capitalize on security needs",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "33--35",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090152J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PDa,
  author =       "Anonymous",
  title =        "Panel discussion-into the 1990s",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "37--40",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090153K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:1990:CRC,
  author =       "Paul Evans and Tina Monk",
  title =        "Conference report: {COMPSEC} '89",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "41--44",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090154L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carrol:1990:CRB,
  author =       "John M. Carrol",
  title =        "Conference report: 2300 brave virus threat to attend
                 national security conference",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "45--49",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090155M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "51--51",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090156N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smulders:1990:TIT,
  author =       "Peter Smulders",
  title =        "The threat of information theft by reception of
                 electromagnetic radiation from {RS-232} cables",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "53--58",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090157O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mercer:1990:TMA,
  author =       "Lindsay C. J. Mercer",
  title =        "Tailor-made auditing of information systems for the
                 detection of fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "59--66",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090158P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Burns:1990:SSR,
  author =       "John Burns and Chris J. Mitchell",
  title =        "A security scheme for resource sharing over a
                 network",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "67--75",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090159Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramaswamy:1990:KMA,
  author =       "Raju Ramaswamy",
  title =        "A key management algorithm for secure communication in
                 open systems interconnection architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "77--84",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090160U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "85--86",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090161L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "87--96",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090162M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PF,
  author =       "Anonymous",
  title =        "Pages 2--96 ({February 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "100--101",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090080D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "102--109",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900814",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1990:HAT,
  author =       "Belden Menkus",
  title =        "How an ``audit trail'' aids in maintaining information
                 integrity \ldots{} as illustrated in retailing",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "111--116",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tabbey:1990:CCP,
  author =       "Kirk W. Tabbey",
  title =        "Computer crime: {``Preparing} the computer specific
                 search {warrant''}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "117--123",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herschberg:1990:FFF,
  author =       "I. S. Herschberg and R. Paans",
  title =        "{Friday} the 13th, facts and fancies",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "125--130",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900847",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Al-Dossary:1990:CVP,
  author =       "Ghannam M. Al-Dossary",
  title =        "Computer virus prevention and containment on
                 mainframes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "131--137",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900858",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Klopp:1990:MSS,
  author =       "Charlotte Klopp",
  title =        "Microcomputer security systems attempt to lock up
                 desktops",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "139--141",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900869",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "143--143",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090087A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Domingo-Ferrer:1990:SNB,
  author =       "Josep Domingo-Ferrer and Lloren{\c{c}} Huguet-Rotger",
  title =        "Secure network bootstrapping: an algorithm for
                 authentic key exchange and digital signitures",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "145--152",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090088B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zviran:1990:SDS,
  author =       "Moshe Zviran and James C. Hoge and Val A. Micucci",
  title =        "{SPAN} --- a {DSS} for security plan analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "153--160",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090089C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1990:ACM,
  author =       "R. Paans and I. S. Herschberg",
  title =        "Auditing the change management process",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "161--174",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090090G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "175--176",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900917",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "177--187",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "189--191",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900939",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PAa,
  author =       "Anonymous",
  title =        "Pages 100--191 ({April 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "194--195",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090163N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "196--208",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090164O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1990:UDC,
  author =       "Belden Menkus",
  title =        "Understanding data communication security
                 vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "209--213",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090165P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherizen:1990:CCR,
  author =       "Sanford Sherizen",
  title =        "Criminological concepts and research findings relevant
                 for improving computer crime control",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "215--222",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090166Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herschberg:1990:SSS,
  author =       "I. S. Herschberg and R. Paans",
  title =        "Sloppy, sloppier, sloppiest",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "223--228",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090167R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Klopp:1990:MOP,
  author =       "Charlotte Klopp",
  title =        "More options for physical access control",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "229--232",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090168S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "233--233",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090169T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laferriere:1990:DIS,
  author =       "Claude Laferriere",
  title =        "A discussion of implementation strategies for secure
                 database management systems",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "235--244",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090170X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Muftic:1990:TPA,
  author =       "Sead Muftic",
  title =        "Transaction protection by ``antennas''",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "245--255",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090171O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Preneel:1990:CFC,
  author =       "Bart Preneel and Antoon Bosselaers and Ren{\'e}
                 Govaerts and Joos Vandewalle",
  title =        "Cryptanalysis of a fast cryptographic checksum
                 algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "257--262",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090172P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "263--264",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090173Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "265--273",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090174R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PM,
  author =       "Anonymous",
  title =        "Pages 194--273 ({May 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "280--281",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090094A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "282--294",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090095B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Homer:1990:SSE,
  author =       "Steve Homer",
  title =        "Setting standards in {Europe}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "295--300",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090096C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1990:POS,
  author =       "Bernard P. Zajac",
  title =        "People: the ``other'' side of computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "301--303",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090097D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PDC,
  author =       "Anonymous",
  title =        "Panel discussion: Are computer viruses here to stay",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "305--307",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090098E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Klopp:1990:VAI,
  author =       "Charlotte Klopp",
  title =        "Vulnerability awareness improves contingency
                 planning",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "309--311",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090099F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:1990:HCP,
  author =       "Paul Evans",
  title =        "How can professional standards be set and
                 maintained?",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "313--316",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901008",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:RAI,
  author =       "Anonymous",
  title =        "Refereed articles: International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "317--317",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cole:1990:MSD,
  author =       "Robert Cole",
  title =        "A model for security in distributed systems",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "319--330",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090102Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mercer:1990:FDR,
  author =       "Lindsay C. J. Mercer",
  title =        "Fraud detection via regression analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "331--338",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090103Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Badenhorst:1990:CSM,
  author =       "K. P. Badenhorst and Jan H. P. Eloff",
  title =        "Computer security methodology: Risk analysis and
                 project definition",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "339--346",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "347--348",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAd,
  author =       "Anonymous",
  title =        "Abstract of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "349--358",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PJ,
  author =       "Anonymous",
  title =        "Pages 280--358 ({June 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "364--365",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900652",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "366--378",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900663",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Winters:1990:SSD,
  author =       "Peter Winters",
  title =        "Secure systems design --- an evolving national
                 strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "379--389",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gliss:1990:EGH,
  author =       "Hans Gliss",
  title =        "{East Germany} --- haven for software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "391--393",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900685",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1990:HMI,
  author =       "Charles Cresson Wood",
  title =        "How many information security staff people should you
                 have?",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "395--402",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900696",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1990:NG,
  author =       "Jon David",
  title =        "The numbers game",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "403--407",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090070A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRd,
  author =       "Anonymous",
  title =        "International board of referres",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "409--409",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090071Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1990:IMC,
  author =       "Scott K. Jones and Clinton E. White",
  title =        "The {IPM} model of computer virus management",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "411--417",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lloyd:1990:SEH,
  author =       "Ivor Lloyd",
  title =        "Software evaluation in high integrity systems",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "419--429",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900733",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McKosky:1990:FIC,
  author =       "Robert A. McKosky and Sajjan G. Shiva",
  title =        "A file integrity checking system to detect and recover
                 from program modification attacks in multi-user
                 computer systems",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "431--446",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900744",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "447--448",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900755",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAe,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "449--458",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900766",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schell:1990:BRT,
  author =       "Roger R. Schell and David Bailey",
  title =        "Book Review: {{\booktitle{Taschenlexicon Sicherheit
                 der Informationstechnik}}: by Dr. Hartmut Pohl with
                 assistance from Ludger Hutte and Ursula Weiler,
                 DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln
                 40, F.R.G., ISBN 3-89209-000-9, 1989}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "459--460",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900777",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "461--463",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:CAS,
  author =       "Anonymous",
  title =        "Conference announcement: Sixth annual computer
                 security applications conference",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "464--464",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900799",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PAb,
  author =       "Anonymous",
  title =        "Pages 364--464 ({August 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "468--469",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901219",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "470--482",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090122A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1990:WDC,
  author =       "Belden Menkus",
  title =        "Why data communications are insecure",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "483--487",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090123B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1990:SCI,
  author =       "John M. Carroll",
  title =        "Security and credibility in an information-intensive
                 society",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "489--498",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090124C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Candia:1990:HVK,
  author =       "Tanya Candia",
  title =        "How {VMS} keeps out intruders",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "499--502",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090125D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1990:WWT,
  author =       "Bernard P. Zajac",
  title =        "The 1990s-what will they hold?",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "503--507",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090126E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jackson:1990:CSC,
  author =       "Keith Jackson",
  title =        "Confessions of a security consultant",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "509--511",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090127F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:CR,
  author =       "Anonymous",
  title =        "Conference roundup",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "513--516",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090128G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "517--517",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090129H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1990:AAC,
  author =       "T. A. Parker",
  title =        "Application access control standards for distributed
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "519--528",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090130L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wiseman:1990:CCD,
  author =       "Simon Wiseman",
  title =        "Control of confidentiality in databases",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "529--537",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090131C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harn:1990:CKG,
  author =       "Lein Harn and Hung-Yu Lin",
  title =        "A cryptographic key generation scheme for multilevel
                 data security",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "539--546",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090132D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAf,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "549--556",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090133E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1990:SCC,
  author =       "Charles Creson Wood",
  title =        "Spectacular computer crimes --- what they are and how
                 they cost {American} business half a billion dollars a
                 year!: {Buck Bloombecker, Don Jones-Irwin, Homewood,
                 IL, 1990}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "557--557",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090134F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PLE,
  author =       "Anonymous",
  title =        "Preliminary list of exhibitors for {Compsec
                 International '90}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "559--561",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090135G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PO,
  author =       "Anonymous",
  title =        "Pages 468--561 ({October 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "6",
  pages =        "??--??",
  month =        oct,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "568--569",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090053V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "570--586",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090054W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1990:CLH,
  author =       "Belden Menkus",
  title =        "The complexity of ``long haul'' data communication
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "587--592",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090055X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1990:NV,
  author =       "Jon David",
  title =        "The {Novell} virus",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "593--599",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090056Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1990:ICS,
  author =       "Bernard P. Zajac",
  title =        "Interview with {Clifford} Stoll",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "601--603",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090057Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Banks:1990:SP,
  author =       "Simon Banks",
  title =        "Security policy",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "605--610",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "611--611",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carroll:1990:DIY,
  author =       "John M. Carroll",
  title =        "``Do-it-yourself'' cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "613--619",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890900607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laferriere:1990:SAT,
  author =       "Claude Laferriere and G. Owen Higginson and Gordon G.
                 Bell",
  title =        "Security architectures for textual databases",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "621--630",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090061W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shepherd:1990:CSS,
  author =       "S. J. Shepherd and P. W. Sanders and A. Patel",
  title =        "A comprehensive security system --- the concepts,
                 agents and protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "631--643",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090062X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "645--646",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090063Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAg,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "647--654",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090064Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PN,
  author =       "Anonymous",
  title =        "Pages 568--654 ({November 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:47 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "658--659",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901075",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1990:RBBh,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "660--675",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1990:FMF,
  author =       "Charles Cresson Wood",
  title =        "Fifteen major forces driving the civilian information
                 security market",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "677--686",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1990:EII,
  author =       "Jack Bologna",
  title =        "Ethical issues of the information era",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "689--692",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090110F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lathrop:1990:PIC,
  author =       "David L. Lathrop",
  title =        "{Perestroika} and its implications for computer
                 security in the {U.S.S.R.}",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "693--696",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "697--697",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olson:1990:CAC,
  author =       "Ingrid M. Olson and Marshall D. Abrams",
  title =        "Computer access control policy choices",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "699--714",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Burk:1990:VES,
  author =       "Holger B{\"u}rk and Andreas Pfitzmann",
  title =        "Value exchange systems enabling security and
                 unobservability",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "715--721",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404890901149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zviran:1990:CPK,
  author =       "Moshe Zviran and William J. Haga",
  title =        "Cognitive passwords: the key to easy access control",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "723--736",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090115A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "737--738",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090116B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:ARAh,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "739--747",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090117C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "749--750",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090118D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:AIR,
  author =       "Anonymous",
  title =        "Author index for refereed articles in vol. 9",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "751--751",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090119E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:SIR,
  author =       "Anonymous",
  title =        "Subject index for refereed articles in vol. 9",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "753--756",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489090120I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1990:PDb,
  author =       "Anonymous",
  title =        "Pages 658--756 ({December 1990})",
  journal =      j-COMPUT-SECUR,
  volume =       "9",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "1990",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190047H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "2--3",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190048I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "4--16",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190049J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Robertson:1991:EMS,
  author =       "Bernard Robertson",
  title =        "Electronic mail --- Is is safe to use?",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "17--19",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190050N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Farquhar:1991:OAR,
  author =       "Bill Farquhar",
  title =        "One approach to risk assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "21--23",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190051E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tanaka:1991:KDS,
  author =       "Kazue Tanaka and Eiji Okamoto",
  title =        "Key distribution system for mail systems using
                 {ID}-related information directory",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "25--33",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190052F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRa,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "35--35",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190053G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:1991:MFC,
  author =       "Chris J. Mitchell and Vijay Varadharajan",
  title =        "Modified forms of cipher block chaining",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "37--40",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190054H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laferriere:1991:PBP,
  author =       "Claude Laferriere",
  title =        "Predicate based polyinstantiation in multi-level
                 secure {DBMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "41--49",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190055I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Varadharajan:1991:MSD,
  author =       "Vijay Varadharajan and Stewart Black",
  title =        "Multilevel security in a distributed object-oriented
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "51--68",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190056J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carr:1991:EDI,
  author =       "J. Carr",
  title =        "Electronic data interchange --- security risk or
                 not?",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "69--72",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190057K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "73--74",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190058L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:CI,
  author =       "Anonymous",
  title =        "{Compsec International 90}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "75--77",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190059M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "78--83",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190060Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "84--86",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190061H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:GAa,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "87--87",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190062I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PF,
  author =       "Anonymous",
  title =        "Pages 2--87 ({February 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "90--91",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190001T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "92--100",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190002U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rihaczek:1991:HIE,
  author =       "Karl Rihaczek",
  title =        "The harmonized {ITSEC} evaluation criteria",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "101--110",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190003V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thimbleby:1991:CVE,
  author =       "Harold Thimbleby",
  title =        "Can viruses ever be useful?",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "111--114",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190004W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "115--115",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190005X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Press:1991:STI,
  author =       "Jim Press",
  title =        "Secure transfer of identity and privilege attributes
                 in an open systems environment",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "117--127",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190006Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jan:1991:DKL,
  author =       "J. K. Jan and C. C. Chang and S. J. Wang",
  title =        "A dynamic key-lock-pair access control scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "129--139",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190007Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:1991:DSM,
  author =       "D. Gritzalis and A. Tomaras and S. Katsikas and J.
                 Keklikoglou",
  title =        "Data security in medical information systems: the
                 {Greek} case",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "141--159",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891900082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "161--162",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891900093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "163--177",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190010B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "178--180",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891900112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PAa,
  author =       "Anonymous",
  title =        "Pages 90--180 ({April 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:48 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "182--183",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190028C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:NMV,
  author =       "Harold Joseph Highland",
  title =        "A non-mathematical view of encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "184--188",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190029D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:EEP,
  author =       "Harold Joseph Highland",
  title =        "Evaluating an encryption package",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "189--190",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190030H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:CUA,
  author =       "Harold Joseph Highland",
  title =        "Computers under attack",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "190--191",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891900318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:MU,
  author =       "Harold Joseph Highland",
  title =        "Microcomputer utilities",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "191--195",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891900329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:NVI,
  author =       "Harold Joseph Highland",
  title =        "{NTIS} volumes of interest",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "195--198",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190033A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1991:HBD,
  author =       "Belden Menkus",
  title =        "How to begin dealing with computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "199--203",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190034B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Banks:1991:UIC,
  author =       "Simon Banks",
  title =        "Understanding {IBM}'s {CICS} systems to improve
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "205--212",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190035C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kowalski:1991:ANC,
  author =       "Stewart Kowalski",
  title =        "The {ABCs} and {Es} of national computer security
                 policies",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "213--216",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190036D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kowalski:1991:CAN,
  author =       "Stewart Kowalski",
  title =        "Cybernetic analysis of national computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "217--227",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190037E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kowalski:1991:CAU,
  author =       "Stewart Kowalski",
  title =        "Cybernetic analysis of the {12th U.S. National
                 Computer Security Conference}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "228--235",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190038F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:RAa,
  author =       "Anonymous",
  title =        "Refereed articles",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "237--237",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190039G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1991:CAT,
  author =       "Fred Cohen",
  title =        "A cost analysis of typical computer viruses and
                 defenses",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "239--250",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190040K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1991:ASS,
  author =       "Ronald Paans and Hans de Lange",
  title =        "Auditing the {SNA\slash SNI} environment",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "251--261",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190041B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laurichesse:1991:OIR,
  author =       "Denis Laurichesse and Laurent Blain",
  title =        "Optimized implementation of {RSA} cryptosystem",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "263--267",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190042C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "269--270",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190043D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allen:1991:TOM,
  author =       "R. J. Allen",
  title =        "Trusted {ORACLE}-multilevel secure data management for
                 military computing",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "271--275",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190044E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "277--284",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190045F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "285--287",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190046G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PM,
  author =       "Anonymous",
  title =        "Pages 182--287 ({May 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "290--291",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190102J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1991:CFS,
  author =       "Belden Menkus",
  title =        "``Control'' is fundamental to successful information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "293--297",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190103K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hiles:1991:CFR,
  author =       "Andrew Hiles",
  title =        "Computer fire risks",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "299--302",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190104L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bologna:1991:FEA,
  author =       "Jack Bologna",
  title =        "A framework for the ethical analysis of information
                 technologies",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "303--307",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190105M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paans:1991:MES,
  author =       "Ronald Paans",
  title =        "With {MVS\slash ESA} security labels towards {B1}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "309--324",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190106N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:1991:CFS,
  author =       "Paul Evans",
  title =        "Computer fraud --- The situation, detection and
                 training",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "325--327",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190107O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "329--329",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190108P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Post:1991:AVS,
  author =       "Gerald V. Post and Karen-Ann Kievit",
  title =        "Accessibility vs. security: a look at the demand for
                 computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "331--344",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190109Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rushinek:1991:DEF,
  author =       "Avi Rushinek and Sara Rushinek",
  title =        "Data encryption features for computer hardware and
                 software profitability: {I/O} ports, expansion slots,
                 algorithms, cyphers and security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "345--357",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190110Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schramm:1991:CCU,
  author =       "Christof Schramm",
  title =        "Computing centers undermine {MVS} security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "359--370",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190111P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "371--372",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190112Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "373--378",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190113R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "379--380",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190114S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PJ,
  author =       "Anonymous",
  title =        "Pages 290--380 ({June 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:49 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "382--383",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190063J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "384--397",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190064K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1991:UIS,
  author =       "Charles Cresson Wood",
  title =        "Using information security to achieve competitive
                 advantage",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "399--404",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190065L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1991:HKA,
  author =       "Belden Menkus",
  title =        "``{Hackers}'': Know the adversary",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "405--409",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190066M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "411--411",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190067N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1991:IPM,
  author =       "Ravi Sandhu and Sushil Jajodia",
  title =        "Integrity principles and mechanisms in database
                 management systems",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "413--427",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190068O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kruys:1991:PSD,
  author =       "J. P. Kruys",
  title =        "Progress in secure distributed systems",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "429--441",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190069P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{OShea:1991:OSI,
  author =       "G. F. G. O'Shea",
  title =        "Operating system integrity",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "443--465",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190070T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "467--468",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190071K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAe,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "469--481",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190072L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PAb,
  author =       "Anonymous",
  title =        "Pages 382--481 ({August 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "484--485",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190073M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "486--495",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190074N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rosenthal:1991:BRP,
  author =       "Paul Rosenthal and Barry Himel",
  title =        "Business resumption planning: Exercising your
                 emergency response teams",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "497--514",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190075O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfleeger:1991:FSR,
  author =       "Shari Lawrence Pfleeger",
  title =        "A framework for security requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "515--523",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190076P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1991:BCS,
  author =       "Charles Cresson Wood",
  title =        "Burning computer security, privacy, and freedom
                 issues",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "524--532",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190077Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "533--534",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190078R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1991:NHI,
  author =       "Fredrick B. Cohen",
  title =        "A note on high-integrity {PC} bootstrapping",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "535--539",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190079S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1991:BPI,
  author =       "Frederick B. Cohen",
  title =        "A {DOS}-based {{\em POset}} implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "541--551",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190080W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nurmi:1991:SBE,
  author =       "Hannu Nurmi and Arto Salomaa and Lila Santean",
  title =        "Secret ballot elections in computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "553--560",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190081N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "561--562",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190082O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITR,
  author =       "Anonymous",
  title =        "{IFIP\slash TC 11} report",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "563--564",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190083P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peach:1991:DRU,
  author =       "S. Peach",
  title =        "Disaster recovery: an unnecessary cost burden or an
                 essential feature of any {DP} installation?",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "565--568",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190084Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAf,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "569--579",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190085R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "580--581",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190086S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PO,
  author =       "Anonymous",
  title =        "Pages 484--582 ({October 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "6",
  pages =        "??--??",
  month =        oct,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:50 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "584--585",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190115T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "586--600",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190116U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherizen:1991:EUI,
  author =       "Sanford Sherizen",
  title =        "{European} unification '92 impacts on information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "601--610",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190117V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:EN,
  author =       "Anonymous",
  title =        "{Editor}'s note",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "611--611",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190118W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Steinke:1991:DAA,
  author =       "Gerhard Steinke",
  title =        "Design aspects of access control in a knowledge base
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "612--625",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190119X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faak:1991:CVH,
  author =       "Viiveke F{\aa}k",
  title =        "Computer verification of human users' identity: a
                 theoretical model and some evaluation criteria",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "626--636",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:RAb,
  author =       "Anonymous",
  title =        "Refereed articles",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "637--637",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190121S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Domingo-Ferrer:1991:ASA,
  author =       "Joseph Domingo-Ferrer",
  title =        "Algorithm-sequenced access control",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "639--652",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190122T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pottas:1991:CMR,
  author =       "D. Pottas and S. H. von Solms",
  title =        "A computerized management reporting aid for a
                 mainframe security system",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "653--660",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190123U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goyal:1991:ACD,
  author =       "M. L. Goyal and G. V. Singh",
  title =        "Access control in distributed heterogeneous database
                 management systems",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "661--669",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190124V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "671--672",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190125W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IWM,
  author =       "Anonymous",
  title =        "{IFIP\slash WG 11.1}: Management of information
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "673--674",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190126X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAg,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "675--682",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190127Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "683--684",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190128Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:GAb,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "685--685",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901292",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PN,
  author =       "Anonymous",
  title =        "Pages 584--685 ({November 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "688--689",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190087T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1991:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "690--699",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190088U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Preston:1991:CCV,
  author =       "Charles Preston",
  title =        "Creating a corporate virus plan",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "701--710",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190089V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lynch:1991:BRE,
  author =       "Paul Lynch",
  title =        "Beyond {RACF}: Extending user authentication
                 controls",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "711--722",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190090Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Murray:1991:LE,
  author =       "William Hugh Murray",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "723--724",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190091Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "725--726",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190092R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thuraisingham:1991:MSI,
  author =       "Bhavani Thuraisingham",
  title =        "Multilevel security issues in distributed database
                 management systems {II}",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "727--747",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190093S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baskerville:1991:RAS,
  author =       "Richard Baskerville",
  title =        "Risk analysis as a source of professional knowledge",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "749--764",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190094T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coomaraswamy:1991:FOL,
  author =       "Gnanesh Coomaraswamy and Srikanta P. R. Kumar and
                 Michel E. Marhic",
  title =        "Fiber-optic {LAN\slash WAN} systems to support
                 confidential communication",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "765--776",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190095U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "777--778",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190096V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:ARAh,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "779--788",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190097W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "789--789",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190098X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:AIV,
  author =       "Anonymous",
  title =        "Author index for vol. 10",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "791--791",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190099Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:SIV,
  author =       "Anonymous",
  title =        "Subject index for vol. 10",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "793--797",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190100R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "798--798",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190101I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1991:PD,
  author =       "Anonymous",
  title =        "Pages 688--798 ({December 1991})",
  journal =      j-COMPUT-SECUR,
  volume =       "10",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "1991",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:51 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "2--2",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "2--3",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290212A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "4--15",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290213B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:CRC,
  author =       "Anonymous",
  title =        "Conference report: {Compsec international '91}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "16--17",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290214C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:HRB,
  author =       "Belden Menkus",
  title =        "A high rise building fire case study",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "19--23",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290215D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherman:1992:DSS,
  author =       "Robin L. Sherman",
  title =        "Distributed systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "24--28",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290216E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1992:CVR,
  author =       "Bernard P. Zajac",
  title =        "Computer viral risks-how bad is the threat?",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "29--34",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290217F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNa,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "35--38",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290218G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "39--39",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290219H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lunt:1992:SDS,
  author =       "Teresa F. Lunt",
  title =        "Security in database systems: a research perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "41--56",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290220L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laribi:1992:PMI,
  author =       "Atika Laribi and Dennis Kafura",
  title =        "A protection model incorporating both authorization
                 and constraints",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "57--73",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290221C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Longley:1992:ASS,
  author =       "D. Longley and S. Rigby",
  title =        "An automatic search for security flaws in key
                 management schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "75--89",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290222D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "91--92",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290223E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "93--103",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290224F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "104--105",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290225G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAa,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "106--106",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290226H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PMa,
  author =       "Anonymous",
  title =        "Pages 2--106 ({March 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "1",
  pages =        "??--??",
  month =        mar,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "108--109",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290034O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "110--120",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290035P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:ICS,
  author =       "Belden Menkus",
  title =        "Introduction to computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "121--127",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290036Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherman:1992:BF,
  author =       "Robin L. Sherman",
  title =        "Biometrics futures",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "128--133",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290037R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:BRP,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Practical Unix security}}:
                 Simon Garfinkel and Gene Spafford O'Reilly and
                 Associates, Inc. (Sebastopol, CA 95472, U.S.A.) U.S.
                 Price: \$29.95 ISBN:0-939195-72-2}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "134--139",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290038S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1992:LE,
  author =       "Frederick B. Cohen",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "140--142",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290039T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNb,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "145--146",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290040X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "147--147",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290041O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:1992:DAR,
  author =       "D. Gritzalis and S. Katsikas and J. Keklikoglou and A.
                 Tomaras",
  title =        "Determining access rights for medical information
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "149--161",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290042P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rangan:1992:ATT,
  author =       "P. Venkat Rangan",
  title =        "An axiomatic theory of trust in secure communication
                 protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "163--172",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290043Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laun:1992:AUA,
  author =       "Rotraut Laun",
  title =        "Asymmetric user authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "173--183",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290044R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "185--192",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290045S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PA,
  author =       "Anonymous",
  title =        "Pages 108--192 ({April 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "198--199",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290196X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "200--209",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290197Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:CCS,
  author =       "Belden Menkus",
  title =        "Concerns in computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "211--215",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290198Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1992:CEA,
  author =       "Bernard P. Zajac",
  title =        "Cost-effectiveness of anti-viral software",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "217--226",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901992",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:SIN,
  author =       "Harold Joseph Highland",
  title =        "The security impact of networks, telecommunications,
                 and office automation",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "227--232",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290200B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madsen:1992:GSC,
  author =       "Wayne Madsen",
  title =        "Government-sponsored computer warfare and sabotage",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "233--236",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Graham:1992:PSN,
  author =       "I. G. Graham and S. H. Wieten",
  title =        "The {PC} as a secure network workstation",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "237--244",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNc,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "247--250",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "251--251",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Davida:1992:PVV,
  author =       "George I. Davida and Yvo G. Desmedt",
  title =        "Passports and visas versus {IDs}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "253--258",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olivier:1992:BSD,
  author =       "M. S. Olivier and S. H. von Solms",
  title =        "Building a secure database using self-protecting
                 objects",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "259--271",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:1992:OPW,
  author =       "Eugene H. Spafford",
  title =        "{OPUS}: Preventing weak password choices",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "273--278",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "279--287",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892902089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "288--289",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290209A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAb,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "290--290",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290210I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PMb,
  author =       "Anonymous",
  title =        "Pages 198--290 ({May 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:52 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "292--293",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290168Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "294--306",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290169R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dixon:1992:RJC,
  author =       "R. Dixon and C. Marston and P. Collier",
  title =        "A report on the joint {CIMA} and {IIA} computer fraud
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "307--313",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290170V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{deVries:1992:IT,
  author =       "T. P. de Vries",
  title =        "The implementation of {TSS}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "315--325",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290171M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Associates:1992:ISA,
  author =       "Janus Associates",
  title =        "Information security administration model: a
                 management model to help identify the best practices of
                 the administration function within the security group",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "327--340",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290172N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNd,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "341--343",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290173O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "345--345",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290174P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liepens:1992:IDR,
  author =       "G. E. Liepens and H. S. Vaccaro",
  title =        "Intrusion detection: Its role and validation",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "347--355",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290175Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:1992:SEL,
  author =       "Jie Wu and Eduardo B. Fernandez and Ruiguang Zhang",
  title =        "Some extensions to the lattice model for computer
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "357--369",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290176R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "371--373",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290177S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of Recent Articles and Literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "375--383",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290178T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "384--385",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290179U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "386--386",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290180Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PJ,
  author =       "Anonymous",
  title =        "Pages 292--386 ({July 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "4",
  pages =        "??--??",
  month =        jul,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "388--389",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "390--406",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lawrence:1992:RSG,
  author =       "L. G. Lawrence",
  title =        "{RACIF} security goals comment on a paper by R.
                 Paans",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "407--411",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290003A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Norman:1992:PSI,
  author =       "Geoff Norman",
  title =        "{PC} security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "412--416",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290004B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:LGC,
  author =       "Belden Menkus",
  title =        "The lessons of the Great {Chicago} flood of 1992",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "417--420",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290005C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lathrop:1992:SAW,
  author =       "David L. Lathrop",
  title =        "Security aspects of wireless local area networks",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "421--426",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290006D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bauspiess:1992:RCH,
  author =       "Fritz Bauspiess and Frank Damm",
  title =        "Requirements for cryptographic hash functions",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "427--437",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290007E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1992:LE,
  author =       "Bernard P. Zajac",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "439--440",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290008F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNe,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "441--442",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290009G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RAI,
  author =       "Anonymous",
  title =        "Refereed articles International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "443--443",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290010O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bergen:1992:DSF,
  author =       "Helen A. Bergen and James M. Hogan",
  title =        "Data security in a fixed-model arithmetic coding
                 compression algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "445--461",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290011F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caelli:1992:EHU,
  author =       "W. J. Caelli and A. W. Rhodes and N. C. Russell",
  title =        "An evaluation of {HP-UX (UNIX)} for database
                 protection using the {European ITSEC}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "463--479",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290012G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "481--483",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290013H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:CFR,
  author =       "Anonymous",
  title =        "City firms rally round after {IRA} bombing",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "485--485",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290014I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:DM,
  author =       "Anonymous",
  title =        "Dirty macs",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "485--485",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290015J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PCM,
  author =       "Anonymous",
  title =        "Police crack major hacker ring",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "485--485",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290016K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Berman:1992:WCW,
  author =       "Jerry Berman and John Gilmore and Mitchell Kapor",
  title =        "Wake up: the cold war is over",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "485--486",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290017L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Booker:1992:GCF,
  author =       "Ellis Booker and Jim Nash",
  title =        "Great {Chicago} flood of '92: {IS} groups stay high
                 and dry",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "486--486",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290018M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:BSB,
  author =       "Anonymous",
  title =        "{BSA} sweep on {Benelux} region",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "486--487",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290019N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:FCM,
  author =       "Anonymous",
  title =        "{FAST} corporate membership",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "487--487",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290023K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:NAC,
  author =       "Anonymous",
  title =        "{NSA} approves {CD}-{ROM} encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "487--487",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290021I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:1992:EAG,
  author =       "David Evans",
  title =        "{East Asian} Gang counterfeits {Microsoft MS-DOS}
                 holograms",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "487--487",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290020R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ha:1992:CFN,
  author =       "Tu Thanh Ha",
  title =        "Computer files need more safeguards, hospitals told",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "487--487",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290022J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fawcett:1992:FPT,
  author =       "Neil Fawcett",
  title =        "{FAST} pushes for tough action on {Unix} piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "487--488",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290024L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:B,
  author =       "Anonymous",
  title =        "Bombed out",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "488--488",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290025M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RSD,
  author =       "Anonymous",
  title =        "Rain sickens data centre",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "488--488",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290028P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VIC,
  author =       "Anonymous",
  title =        "Viruses infect 37 computers",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "488--488",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290026N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1992:TVG,
  author =       "Tony Smith",
  title =        "Typeface vendors gang up on pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "488--488",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290027O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moeller:1992:UBC,
  author =       "Mike Moeller",
  title =        "{US} banks can buy cover against computer crime",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "488--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290029Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:HVW,
  author =       "Anonymous",
  title =        "Hackers and virus writers-are they outlaws or
                 heroes?",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290032M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VHS,
  author =       "Anonymous",
  title =        "Viruses-here to stay",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290031L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VMG,
  author =       "Anonymous",
  title =        "Viral mind games",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290030U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fawcett:1992:GPA,
  author =       "Neil Fawcett",
  title =        "{German} pirates avoid blacklist",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290033N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rotenberg:1992:FEP,
  author =       "Marc Rotenberg",
  title =        "{FBI} endangering privacy for all",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--489",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290243K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horwitt:1992:STF,
  author =       "Elisabeth Horwitt",
  title =        "Sprint, telematic fight phone Fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "489--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290244L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:EAa,
  author =       "Anonymous",
  title =        "Enemy action",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290245M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ferelli:1992:NDS,
  author =       "Mark Ferelli",
  title =        "New disk strategies remove security risks",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290246N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Janusz:1992:PPP,
  author =       "Cheryl Janusz",
  title =        "Power protection plays a vital role in network
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290249Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{North:1992:CC,
  author =       "Sandra North",
  title =        "To catch a ``crimoid''",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290247O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Taylor:1992:VPY,
  author =       "Wendy Taylor",
  title =        "Virus-proof your {PC}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--490",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290248P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Withers:1992:PSS,
  author =       "Lucia Withers",
  title =        "Putting a stop to software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "490--491",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290250U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Booker:1992:RSE,
  author =       "Ellis Booker",
  title =        "Retinal scanners eye-dentify inmates",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "491--491",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290253N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{King:1992:CT,
  author =       "Julia King",
  title =        "It's {C.Y.A.} time",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "491--491",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290254O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miyoshi:1992:STB,
  author =       "Dennis Miyoshi and Mary Green",
  title =        "Security and technology: a better mousetrap",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "491--491",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290252M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Warren:1992:CSF,
  author =       "Peter Warren",
  title =        "Crime sans frontiers or the end of liberty",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "491--491",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290251L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sommer:1992:FCF,
  author =       "Peter Sommer",
  title =        "Finding a crime to fit the punishment",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "491--492",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290255P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ISE,
  author =       "Anonymous",
  title =        "{IT} security evaluation manual-the current status",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "492--492",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290257R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lunt:1992:AAT,
  author =       "Teresa Lunt",
  title =        "Automated audit trail analysis for intrusion
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "492--492",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290256Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madsen:1992:GES,
  author =       "Wayne Madsen",
  title =        "Government eavesdropping-should consumers pay?",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "492--492",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290258S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McLaughlin:1992:YAM,
  author =       "Robert McLaughlin",
  title =        "Yet another machine to break {DES}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "492--492",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290259T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "493--494",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290260X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PS,
  author =       "Anonymous",
  title =        "Pages 388--494 ({September 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "5",
  pages =        "??--??",
  month =        sep,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:53 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "496--497",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290181P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "498--507",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290182Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gilbert:1992:BSS,
  author =       "Fran{\c{c}}oise Gilbert",
  title =        "Breach of system security and theft of data: Legal
                 aspects and preventive measures",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "508--517",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290183R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Robinson:1992:CSE,
  author =       "John Robinson",
  title =        "Computer security evaluation: Developments in the
                 {European ITSEC} programme",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "518--524",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290184S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:UES,
  author =       "Belden Menkus",
  title =        "Understanding {EDI} security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "525--528",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290185T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bowe:1992:LE,
  author =       "Rennie Bowe",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "529--530",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290186U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNf,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "531--534",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290187V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAe,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "535--542",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290188W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "543--544",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290189X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "545--545",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1992:EPS,
  author =       "Ravi S. Sandhu and Sushil Jajodia",
  title =        "Eliminating polyinstantiation securely",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "547--562",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290191S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1992:DDA,
  author =       "Frederick B. Cohen",
  title =        "Defense-in-depth against computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "563--579",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290192T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1992:BSP,
  author =       "Sebastiaan von Solms and David Naccache",
  title =        "On blind signatures and perfect crimes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "581--583",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290193U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "585--587",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290194V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAd,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "588--588",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290195W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PO,
  author =       "Anonymous",
  title =        "Pages 496--588 ({October 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "6",
  pages =        "??--??",
  month =        oct,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:54 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "590--591",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290134D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "592--601",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290135E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Solomon:1992:VAS,
  author =       "Alan Solomon",
  title =        "The virus authors strike back",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "602--606",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290136F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1992:LSS,
  author =       "Jon David",
  title =        "{LAN} security standards",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "607--619",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290137G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cerullo:1992:CCP,
  author =       "Michael J. Cerullo and R. Steve McDuffie",
  title =        "Computer contingency plans and the auditors: a survey
                 of businesses affected by Hurricane Hugo",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "620--622",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290138H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Antion:1992:LE,
  author =       "Karen Antion",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "623--624",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290139I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNg,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "625--628",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290140M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ARAf,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "629--636",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290141D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "637--637",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290142E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "639--639",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290143F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1992:FDC,
  author =       "F. B. Cohen",
  title =        "A formal definition of computer worms and some related
                 results",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "641--652",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290144G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Muftic:1992:CGS,
  author =       "Sead Muftic and Edina Hatunic",
  title =        "{CISS}: Generalized security libraries",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "653--659",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290145H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thuraisingham:1992:MSI,
  author =       "Bhavani Thuraisingham and Harvey H. Rubinovitz",
  title =        "Multilevel security issues in distributed database
                 management {systems-III}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "661--674",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290146I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "675--677",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290147J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAe,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "678--678",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290148K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PN,
  author =       "Anonymous",
  title =        "Pages 590--678 ({November 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "680--681",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900856",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:RBBh,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "682--694",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900867",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Whiting:1992:UVV,
  author =       "Todd Whiting",
  title =        "Understanding {VAX\slash VMS} security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "695--698",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900878",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Black:1992:UOS,
  author =       "George Black",
  title =        "Update on open systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "699--702",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900889",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1992:RED,
  author =       "Belden Menkus",
  title =        "{Re}-examining the Data Encryption Standard",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "703--706",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290089A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{King:1992:XS,
  author =       "Judith King",
  title =        "{X.400} security",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "707--710",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290090E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anderson:1992:LE,
  author =       "Ross Anderson",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "710--710",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardy:1992:CSC,
  author =       "Gary Hardy",
  title =        "Case study: Closing `windows' against intruders",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "711--714",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1992:ITNh,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "715--719",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900937",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:HDP,
  author =       "Anonymous",
  title =        "Hackers demonstrate phone banking weakness:
                 {Information Security Monitor, October 1992, p 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "721--721",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900948",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:SBV,
  author =       "Anonymous",
  title =        "Suppliers are biggest virus carriers: {Computer
                 Weekly, 29 October 1992, p. 17}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "721--721",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290097B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ULU,
  author =       "Anonymous",
  title =        "{University} lecturer uses virus threat to blackmail:
                 {David Evans. Computer Weekly, 8 October 1992, p. 1.}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "721--721",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892900959",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:UPD,
  author =       "Anonymous",
  title =        "{US} pays dear for data loss: {Computing, 29 October
                 1992, p. 4}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "721--721",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290096A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:EUP,
  author =       "Anonymous",
  title =        "Electronic underground: {Privacy Journal, October
                 1992}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--722",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290099D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:LAV,
  author =       "Anonymous",
  title =        "Leap in anti-virus vaccine: {Computing, 22 October
                 1992, p. 2}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--722",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290098C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RPS,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{{PC} security theatened by new
                 wave operating systems}}: David Hains. Computer Control
                 Quarterly, Vol. 10, No. 2, 1992, pp. 8--10}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--722",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290101V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RCD,
  author =       "Anonymous",
  title =        "Roles changed in downsized environment: {Computer
                 Security Alert, October 1992}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--722",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290102W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:UJD,
  author =       "Anonymous",
  title =        "{US Justice Department} `stole' software: {Wayne
                 Madsen. Computer Fraud and Security Bulletin, October
                 1992, pp. 1 $ \epsilon $ \#38; 2}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--722",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901006",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RIR,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{The increasing risks of using
                 e-mail}}: James Carroll The Bottom Line, September
                 1992, pp. 21 and 22}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "722--723",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290103X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:EMF,
  author =       "Anonymous",
  title =        "Evidence of market failure of {UK}'s Computer Misuse
                 Act?: Dealing with computer misuse --- published by the
                 {Department of Trade and Industry}, p. 24",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "723--723",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290104Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:NUF,
  author =       "Anonymous",
  title =        "{Novell} users face threat to security: {Carlyn
                 Gilooly\slash Bob Brown, Network World, 5 October 1992,
                 pp. 1 and 66, 12 October 1992, pp. 13 and 14.}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "723--723",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290105Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VTT,
  author =       "Anonymous",
  title =        "Virus threat toned down: {James Daly, Computerworld
                 September 14 1992, p. 16}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "723--723",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:AAF,
  author =       "Anonymous",
  title =        "{DOS} to add antivirus features: {James Daly,
                 Computerworld, 7 September 1992, p. 4}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "723--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:CSB,
  author =       "Anonymous",
  title =        "Case study: {Boston TV} station: {Tracy Mitchell, LAN
                 Times, 14 September 1992, p. 16}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:FLR,
  author =       "Anonymous",
  title =        "{French} losses rise sharply: {Paul Gannon, Computer
                 Fraud and Security Bulletin, October 1992, p. 3}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:LSD,
  author =       "Anonymous",
  title =        "Lax security at {Drug Enforcement Administration}:
                 {Gary H. Anthes, Computer world, 5 October 1992, p.
                 24}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PIF,
  author =       "Anonymous",
  title =        "{Project ideas fail to catch \$18 million funding:
                 Computing, 15 October 1992, p. 8.}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PPL,
  author =       "Anonymous",
  title =        "Planned privacy law weakend: {David Evans, Computer
                 Weekly, 15 October 1992, p. 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RPF,
  author =       "Anonymous",
  title =        "Recession puts firms on disaster tightrope: {Jason
                 Hobby, Computer Weekly, 22 October 1992, p. 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "724--724",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290110D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:AHA,
  author =       "Anonymous",
  title =        "After {Hurricane Andrew}: {Gary H. Anthes,
                 Computerworld, 7 September 1992, p. 6}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--725",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901158",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IDD,
  author =       "Anonymous",
  title =        "{IBM\slash DEC} disaster recovery deal:
                 {Computerworld, 28 September 1992, p. 20}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--725",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:RMC,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{Management control and
                 security}}: Jean Hitchings and Bernard Williams
                 Management Accounting, October 1992, pp. 34 and 35}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--725",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:QCC,
  author =       "Anonymous",
  title =        "Quantum cryptography: {Charles H. Bennett, Gilles
                 Brassard and Arthur K. Ekert Scientific American,
                 October 1992, pp. 26--33}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--725",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290117A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VVE,
  author =       "Anonymous",
  title =        "The virtuous virus: {The Economist, 17 October 1992,
                 p. 92}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--725",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290118B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ISS,
  author =       "Anonymous",
  title =        "The importance of security standards: {John Hopkinson,
                 Computer Control Quarterly, Vol. 7, No. 3, 1992, pp.
                 33--37}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "725--726",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290119C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:FSS,
  author =       "Anonymous",
  title =        "`{A} false sense of security': {Jason Hobby, Computer
                 Weekly, 8 October 1992, p. 11}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "726--726",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:HDS,
  author =       "Anonymous",
  title =        "How dangerous are simple virus toolkits?: {Virus
                 Bulletin, September 1992, p. 3}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "726--726",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290120G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:SCR,
  author =       "Anonymous",
  title =        "Statistical confidentiality: {Reg Ward Government
                 Computing, October 1992, p. 6}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "726--726",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901228",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:BRW,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Who's on the line?}}:
                 Richard Heffernan, Security Management, September 1992,
                 p. 59 and 60.}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "726--726",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404892901239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:VAV,
  author =       "Anonymous",
  title =        "Viruses and anti-viruses in {Israel}: {Ephraim Brand,
                 Virus Bulletin, October 1992}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "726--727",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290124A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:HTM,
  author =       "Anonymous",
  title =        "High-tech movie highlights realistic security
                 concerns: {James Daly, Computerworld, September 14
                 1992, p. 1 and 16}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "727--727",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290126C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:UGS,
  author =       "Anonymous",
  title =        "User's guide to safe computing: {Laura Didio, LAN
                 Times, 14 September 1992, p. 1, 110 and 111}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "727--727",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290125B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "729--729",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290127D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:IBRg,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "731--731",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290128E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:1992:ZKP,
  author =       "Dimitris Gritzalis and Sokratis Katsikas and Stefanos
                 Gritzalis",
  title =        "A zero knowledge probabilistic login protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "733--745",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290129F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harn:1992:SAS,
  author =       "Lein Harn and Hung-Yu Lin and Shoubao Yang",
  title =        "A software authentication system for information
                 integrity",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "747--752",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290130J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1992:LBE,
  author =       "Ravi S. Sandhu",
  title =        "Lattice-based enforcement of {Chinese Walls}",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "753--763",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290131A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "765--767",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290132B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:GAf,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "768--768",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489290133C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1992:PD,
  author =       "Anonymous",
  title =        "Pages 680--768 ({December 1992})",
  journal =      j-COMPUT-SECUR,
  volume =       "11",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "1992",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:55 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390001L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "2--3",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390002M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "4--14",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390003N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lawrence:1993:RR,
  author =       "L. G. Lawrence",
  title =        "The role of roles",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "15--21",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390004O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pujals:1993:SP,
  author =       "Joseph M. Pujals",
  title =        "Security and privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "22--27",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390005P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Donovan:1993:SPD,
  author =       "Steve Donovan",
  title =        "Security of {PCs} in a distributed environment",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "28--31",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390006Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Davies:1993:LE,
  author =       "Donald Davies",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "32--32",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390007R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNa,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "33--35",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390008S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAa,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "37--42",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390009T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "45--47",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:RA,
  author =       "Anonymous",
  title =        "Refereed articles",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "49--49",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390011S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1993:HEO,
  author =       "Charles Cresson Wood and William W. Banks",
  title =        "Human error: an overlooked but significant information
                 security problem",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "51--60",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390012T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Longstaff:1993:BPA,
  author =       "Thomas A. Longstaff and E. Eugene Schultz",
  title =        "Beyond preliminary analysis of the {WANK} and {OILZ}
                 worms: a case study of malicious code",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "61--77",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390013U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vaughn:1993:SSI,
  author =       "R. B. Vaughn and H. Saiedian and E. A. Unger",
  title =        "A survey of security issues in office computation and
                 the application of secure computing models to office
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "79--97",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390014V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "99--101",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390015W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:CSG,
  author =       "Anonymous",
  title =        "Computers and security: Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "102--102",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390016X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PF,
  author =       "Anonymous",
  title =        "Pages 2--102 ({February 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:56 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "104--105",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390088M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "106--116",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390089N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stahl:1993:ISW,
  author =       "Stanley H. Stahl",
  title =        "Information security in workstation environments",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "117--122",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390090R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clyde:1993:DSN,
  author =       "Robert A. Clyde",
  title =        "{DECnet} security (Not necessarily an oxymoron)",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "123--127",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390091I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moseley:1993:PKM,
  author =       "David Moseley",
  title =        "Public key management for {X.25} network security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "128--133",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390092J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lathrop:1993:BRN,
  author =       "David L. Lathrop",
  title =        "Book Review: {{\booktitle{Network security in the
                 '90s: Issues and solutions for managers}}: Thomas W.
                 Madron John Wiley and Sons Inc, New York, 1992, 293
                 pages, \$32.95, ISBN: 0-471-54777-8}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "135--135",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390093K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cumming:1993:LE,
  author =       "Andrea Cumming and Steve Roberts",
  title =        "Letters to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "136--138",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390094L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNb,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "139--142",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390095M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAb,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "143--149",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390096N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "151--153",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390097O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "155--155",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390098P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bergen:1993:CPA,
  author =       "Helen A. Bergen and James M. Hogan",
  title =        "A chosen plaintext attack on an adaptive arithmetic
                 coding compression algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "157--167",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390099Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fitch:1993:SPN,
  author =       "John A. Fitch and Lance J. Hoffman",
  title =        "A shortest path network security model",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "169--189",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390100J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1993:PCV,
  author =       "M. C. Jones and K. P. Arnett and J.-T. E. Tang and
                 N.-S. Chen",
  title =        "Perceptions of computer viruses: a cross-cultural
                 assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "191--197",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390101A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:AIV,
  author =       "Anonymous",
  title =        "Author index for vol. 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "199--199",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390102B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:SIV,
  author =       "Anonymous",
  title =        "Subject index for vol. 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "201--205",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390103C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "207--209",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390104D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAa,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "211--211",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390105E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PMa,
  author =       "Anonymous",
  title =        "Pages 104--211 ({March 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "214--215",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390106F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "216--224",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390107G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Norman:1993:DRA,
  author =       "Geoff Norman",
  title =        "Disaster recovery after downsizing",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "225--229",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390108H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lawrence:1993:DSE,
  author =       "L. G. Lawrence",
  title =        "Digital signatures --- Explanation and usage",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "230--233",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390109I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hochberg:1993:NAS,
  author =       "Judith Hochberg and Kathleen Jackson and Cathy
                 Stallings and J. F. McClary and David DuBois and
                 Josephine Ford",
  title =        "{NADIR}: an automated system for detecting network
                 intrusion and misuse",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "235--248",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/0167-4048(93)90110-Q",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390110Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:CR,
  author =       "Harold Joseph Highland",
  title =        "Conference report",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "249--253",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390111H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roberts:1993:LE,
  author =       "Steve Roberts",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "255--257",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390112I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNc,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "259--261",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390113J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAc,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "263--269",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390114K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "270--272",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390115L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:RPIa,
  author =       "Anonymous",
  title =        "Refereed papers: International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "273--273",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390116M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Voas:1993:MDE,
  author =       "Jeffrey M. Voas and Jeffrey E. Payne and Frederick B.
                 Cohen",
  title =        "A model for detecting the existence of software
                 corruption in real time",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "275--283",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390117N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sandhu:1993:DCB,
  author =       "Ravi S. Sandhu and Gurpreet S. Suri",
  title =        "A distributed capability-based architecture for the
                 transform model",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "285--303",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390118O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rangan:1993:ADP,
  author =       "P. Venkat Rangan",
  title =        "The authenticated datagram protocol: a high
                 performance, subtransport level, secure communication
                 protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "305--314",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390119P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "315--317",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390120T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAb,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "318--318",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390121K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PMb,
  author =       "Anonymous",
  title =        "Pages 214--318 ({May 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "320--321",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390017Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:RBB,
  author =       "Anonymous",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "322--333",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390018Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1993:RM,
  author =       "Edwin B. Heinlein",
  title =        "Recovery management",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "334--337",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1993:IKB,
  author =       "John Meyer",
  title =        "The {1993 IFIP Kristian Beckman Award}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "338--340",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900206",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reitenspiess:1993:OSS,
  author =       "Manfred Reitenspiess",
  title =        "Open system security standards",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "341--361",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390021V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNd,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "362--364",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390022W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Messmer:1993:ARA,
  author =       "Ellen Messmer",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "365--370",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390023X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "371--372",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390024Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "373--375",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390025Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:RPIb,
  author =       "Anonymous",
  title =        "Refereed papers: International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "377--377",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900262",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schramm:1993:ASM,
  author =       "Christof Schramm",
  title =        "Added-on security for {MVS}: weaknesses and measures",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "379--388",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Slack:1993:IOO,
  author =       "James M. Slack and Elizabeth A. Unger",
  title =        "Integrity in object-oriented database systems",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "389--404",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lunt:1993:SID,
  author =       "Teresa F. Lunt",
  title =        "A survey of intrusion detection techniques",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "405--418",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "419--419",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900309",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PJ,
  author =       "Anonymous",
  title =        "Pages 320--419 ({June 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "422--423",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390059E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "424--433",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390060I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1993:WTC,
  author =       "Edwin B. Heinlein",
  title =        "World Trade Center --- a retrospective",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "435--436",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900619",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Black:1993:DSS,
  author =       "David K. Black",
  title =        "The Digital Signature Standard: Overview and current
                 status",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "437--446",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390062A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{DiTuri:1993:SEM,
  author =       "Barbara B. {Di Turi}",
  title =        "Security for {EDIFACT} messages",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "447--455",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390063B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNe,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "456--458",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390064C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAd,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "459--464",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390065D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "465--466",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390066E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "467--467",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390067F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Labuschagne:1993:DSX,
  author =       "Frans Labuschagne and Jan Roos",
  title =        "Data security in {X.25} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "469--475",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390068G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfitzmann:1993:MES,
  author =       "Andreas Pfitzmann and Ralf A{\ss}mann",
  title =        "More efficient software implementations of
                 (generalized) {DES}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "477--500",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390069H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fernandez-Gonzalez:1993:EEC,
  author =       "J. Fern{\'a}ndez-Gonz{\'a}lez and G. B. Agnew and A.
                 Ribagorda",
  title =        "Encryption and error correction codes for reliable
                 file storage",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "501--510",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390070L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "511--513",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390071C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAd,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "514--514",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390072D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PA,
  author =       "Anonymous",
  title =        "Pages 422--514 ({August 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "5",
  pages =        "??--??",
  month =        aug,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "516--517",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "518--526",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900468",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1993:DTI,
  author =       "Charles Cresson Wood",
  title =        "Duress terminations and information security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "527--535",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kensey:1993:CVT,
  author =       "Michael F. Kensey",
  title =        "Computer viruses --- Towards better solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "536--541",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390048A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Russell:1993:PVA,
  author =       "Selwyn Russell",
  title =        "Paradigms for verification of authorization at source
                 of electronic documents in an integrated environment",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "542--549",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390049B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ISC,
  author =       "Harold Joseph Highland",
  title =        "{IFIP\slash Sec '93} conference report",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "550--555",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390050F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAe,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "556--560",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900516",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "561--562",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:RPIc,
  author =       "Anonymous",
  title =        "Refereed papers: International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "563--563",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900538",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1993:OSP,
  author =       "Frederick B. Cohen",
  title =        "Operating system protection through program
                 evolution",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "565--584",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:1993:SFC,
  author =       "Eugene H. Spafford and Stephen A. Weeber",
  title =        "Software forensics: Can we track code to its
                 authors?",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "585--595",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390055A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:1993:CFR,
  author =       "J. H. P. Eloff and L. Labuschagne and K. P.
                 Badenhorst",
  title =        "A comparative framework for risk analysis methods",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "597--603",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390056B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "605--607",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390057C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAe,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "608--608",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390058D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PO,
  author =       "Anonymous",
  title =        "Pages 516--608 ({October 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "6",
  pages =        "??--??",
  month =        oct,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:58 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "610--611",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390073E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "612--622",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390074F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Plant:1993:GMB,
  author =       "Martin Plant",
  title =        "Getting management buy-in to {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "623--626",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390075G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1993:WM,
  author =       "Edwin B. Heinlein",
  title =        "{I} worked with {Murphy}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "627--628",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390076H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collins:1993:SYB,
  author =       "Brian S. Collins and Steve Mathews",
  title =        "Securing your business process",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "629--633",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390077I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:VIS,
  author =       "Harold Joseph Highland",
  title =        "A view of information security tomorrow",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "634--639",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390078J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caelli:1993:CAP,
  author =       "W. Caelli and I. Graham and L. O'Connor",
  title =        "Cryptographic Application Programming Interfaces
                 {(APIs)}",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "640--645",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390079K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAf,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "647--652",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390080O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "653--654",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390081F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "655--655",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390082G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Obaidat:1993:MIC,
  author =       "M. S. Obaidat",
  title =        "A methodology for improving computer access security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "657--662",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390083H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1993:PSI,
  author =       "Charles Cresson Wood",
  title =        "Principles of secure information systems design with
                 groupware examples",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "663--678",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390084I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1993:RIR,
  author =       "Marshall D. Abrams and Edward G. Amoroso and Leonard
                 J. LaPadula and Teresa F. Lunt and James G. Williams",
  title =        "Report of an integrity research study group",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "679--689",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390085J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "691--693",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390086K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:GAf,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "694--694",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390087L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PN,
  author =       "Anonymous",
  title =        "Pages 610--694 ({November 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "696--697",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390031Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "698--709",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390032Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fagan:1993:OII,
  author =       "Peter Fagan",
  title =        "Organizational issues in {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "710--715",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900332",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardy:1993:CAI,
  author =       "Gary Hardy",
  title =        "Commercial accreditation of information security",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "716--729",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:NCS,
  author =       "Harold Joseph Highland",
  title =        "16th national computer security conference",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "730--734",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1993:ITNf,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "735--739",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900365",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ARAg,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "740--744",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900376",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "745--746",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "747--749",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "751--751",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489390040C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gollmann:1993:ASD,
  author =       "Dieter Gollmann and Thomas Beth and Frank Damm",
  title =        "Authentication services in distributed systems",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "753--764",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900413",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olnes:1993:ESM,
  author =       "Jon {\O}lnes",
  title =        "{EDIFACT} security made simple-the {EDIMED} approach",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "765--774",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Koerner:1993:STV,
  author =       "Frank Koerner",
  title =        "System threats and vulnerabilities and the contrary
                 principle",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "775--779",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900435",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allinson:1993:MCB,
  author =       "Caroline Allinson and Helen Bergen and Ed Dawson",
  title =        "Message collision in block ciphers with message
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "781--787",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404893900446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1993:PD,
  author =       "Anonymous",
  title =        "Pages 696--787 ({December 1993})",
  journal =      j-COMPUT-SECUR,
  volume =       "12",
  number =       "8",
  pages =        "??--??",
  month =        dec,
  year =         "1993",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:44:59 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "2--2",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900833",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "2--3",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900841",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "4--14",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490085X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shain:1994:SIE,
  author =       "Mr Michael Shain",
  title =        "Security issues with enterprise multimedia",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "15--22",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900868",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoppe:1994:ACS,
  author =       "Norman Hopp{\'e}",
  title =        "Achieving consistent security controls throughout a
                 multinational organization",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "23--29",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900876",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hudoklin:1994:CSS,
  author =       "Alenka Hudoklin and Branislav Smitek",
  title =        "Computer systems security in {Slovenia}",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "30--33",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900884",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Courtney:1994:LE,
  author =       "Robert H. Courtney",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "34--36",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900892",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ARA,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "39--43",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900906",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "45--46",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900914",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "47--49",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAa,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "50--50",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900930",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "51--51",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900949",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:1994:IBC,
  author =       "Jau Liang Chen and Tzonelih Hwang",
  title =        "Identity-based conference key broadcast schemes with
                 user authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "53--57",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900957",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Russell:1994:ARP,
  author =       "Selwyn Russell",
  title =        "Audit-by-receiver paradigms for verification of
                 authorization at source of electronic documents",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "59--67",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dawson:1994:BSS,
  author =       "Ed Dawson and Diane Donovan",
  title =        "The breadth of {Shamir}'s secret-sharing scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "69--78",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900973",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:1994:DAC,
  author =       "Bao-Min Shao and Jing-Jang Hwang and PeCheng Wang",
  title =        "Distributed assignment of cryptographic keys for
                 access control in a hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "79--84",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900981",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:AIV,
  author =       "Anonymous",
  title =        "Author index for vol. 12",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "85--85",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490099X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:SIV,
  author =       "Anonymous",
  title =        "Subject index for vol. 12",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "86--94",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894901007",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:PF,
  author =       "Anonymous",
  title =        "Pages 2--94 ({February 1994})",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "96--97",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490054X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "98--106",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Svigals:1994:SSA,
  author =       "Jerome Svigals",
  title =        "{Smartcards} --- a security assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "107--114",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900566",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menkus:1994:NIB,
  author =       "Belden Menkus",
  title =        "The new importance of ``business continuity'' in data
                 processing disaster recovery planning",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "115--118",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900574",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1994:CSP,
  author =       "Edwin B. Heinlein",
  title =        "Communications, security, privacy and the law",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "119--121",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:ITN,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "123--125",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAa,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "127--132",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900604",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "133--134",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:RPI,
  author =       "Anonymous",
  title =        "Refereed papers: International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "135--135",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900620",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:1994:RPA,
  author =       "Chin-Chin Chang and Wen-Yuan Liao",
  title =        "A remote password authentication scheme based upon
                 {ElGamal}'s signature scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "137--144",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900639",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spector:1994:PSN,
  author =       "Yishay Spector and Jacob Ginzberg",
  title =        "Pass-sentence --- a new approach to computer code",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "145--160",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vazquez-Gomez:1994:MS,
  author =       "Jos{\'e} V{\'a}zquez-G{\'o}mez",
  title =        "Multidomain security",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "161--184",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "185--187",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900663",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAb,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "188--188",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900671",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:PA,
  author =       "Anonymous",
  title =        "Pages 96--188 ({April 1994})",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "2",
  pages =        "??--??",
  month =        apr,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:00 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "190--191",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "192--205",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Courtney:1994:WDW,
  author =       "Robert H. Courtney and Willis H. Ware",
  title =        "What do we mean by integrity?",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "206--208",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900701",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1994:FWS,
  author =       "Charles Cresson Wood",
  title =        "Fifty ways to secure dial-up connections",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "209--215",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1994:BRA,
  author =       "Bernard P. Zajac",
  title =        "Book Review: {{\booktitle{Applied cryptography:
                 Protocols, algorithms, and source code in C}}: Bruce
                 Schneier, John Wiley and Sons, 1994, 618 pages,
                 \$44.95, ISBN: 0-471-59756-2}",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "217--218",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900728",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1994:BRC,
  author =       "Bernard P. Zajac",
  title =        "Book Review: {{\booktitle{Commonsense computer
                 security --- Your practical guide to information
                 protection}} --- 2nd edition: Martin Smith,
                 McGraw-Hill, 1993, 280 pages, \pounds 24.95, \$24.95
                 (USA), ISBN: 0-07-707805-5}",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "218--218",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900736",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1994:BRI,
  author =       "Bernard P. Zajac",
  title =        "Book Review: {{\booktitle{Information security
                 policies made easy}}: Charles Cresson Wood, Baseline
                 Software, Sausalito, CA 94966-1219, USA; 1994, 262
                 pages, \$495, ISBN: 1-881585-01-8}",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "218--219",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900744",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAb,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "221--225",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900752",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "226--227",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900760",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "229--229",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900779",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kanungo:1994:IAH,
  author =       "Shivraj Kanungo",
  title =        "Identity authentication in heterogeneous computing
                 environments: a comparative study for an integrated
                 framework",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "231--253",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900787",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:1994:SDR,
  author =       "C. C. Chang and J. K. Jan and D. J. Buehrer",
  title =        "A scheme to determine the relationship between two
                 users in a hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "255--261",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Magruder:1994:HLL,
  author =       "Scott Magruder",
  title =        "High-level language computer viruses --- a new
                 threat?",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "263--269",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900809",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "270--272",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900817",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAc,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "274--274",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:PM,
  author =       "Anonymous",
  title =        "Pages 190--274 ({May 1994})",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "276--277",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "278--286",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rihaczek:1994:DIL,
  author =       "Karl Rihaczek",
  title =        "Data interchange and legal security --- signature
                 surrogates",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "287--293",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{IW1:1994:IIS,
  author =       "{IFIP Working Group 11.5} and William List and Rob
                 Melville",
  title =        "Integrity in information systems --- Executive
                 summary",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "295--301",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900183",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindballe:1994:LE,
  author =       "J{\o}rgen Lindballe",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "303--305",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900191",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAc,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "306--311",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "312--313",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900213",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "315--315",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900221",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindgreen:1994:VBP,
  author =       "E. E. O. Roos Lindgreen and I. S. Herschberg",
  title =        "On the validity of the {Bell--La Padula} model",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "317--333",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490023X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Longley:1994:EKG,
  author =       "D. Longley and S. Vasudevan",
  title =        "Effect of key generators on the automatic search for
                 flaws in key management schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "335--347",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mostert:1994:MIC,
  author =       "D. N. J. Mostert and S. H. von Solms",
  title =        "A methodology to include computer security, safety and
                 resilience requirements as part of the user
                 requirement",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "349--364",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "365--367",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAd,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "368--368",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Pb,
  author =       "Anonymous",
  title =        "Pages 276--368 (1994)",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:01 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "370--371",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900280",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "372--378",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900299",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Strous:1994:SEC,
  author =       "Leon Strous",
  title =        "Security evaluation criteria",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "379--384",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ganley:1994:DST,
  author =       "Michael J. Ganley",
  title =        "Digital signatures and their uses",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "385--391",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900310",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zajac:1994:CEA,
  author =       "Bernard P. Zajac",
  title =        "Cost effectiveness of anti-viral scanners",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "392--400",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAd,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "401--406",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "407--408",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900353",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Badenhorst:1994:TFA,
  author =       "Karin P. Badenhorst and Jan H. P. Eloff",
  title =        "{TOPM}: a formal approach to the optimization of
                 information technology risk management",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "411--435",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900361",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Born:1994:DAC,
  author =       "Eike Born and Helmut Stiegler",
  title =        "Discretionary access control by means of usage
                 conditions",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "437--450",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490037X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "451--453",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAe,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "454--454",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900396",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Pc,
  author =       "Anonymous",
  title =        "Pages 370--454 (1994)",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "456--457",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "458--465",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190131V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lillywhite:1994:ISS,
  author =       "Thomas Lillywhite",
  title =        "{IT} security standards and the adoption of a
                 benchmarking approach",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "467--471",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190132W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Symonds:1994:SDC,
  author =       "Ian M. Symonds",
  title =        "Security in distributed and client\slash server
                 systems --- a management view",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "473--480",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190133X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1994:NCS,
  author =       "Edwin B. Heinlein",
  title =        "17th National Computer Security Conference --- an
                 opinion",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "481--483",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190134Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAe,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "485--489",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190135Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "490--491",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901362",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "493--493",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901373",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Denault:1994:IDA,
  author =       "Michel Denault and Dimitris Karagiannis and Dimitris
                 Gritzalis and Paul Spirakis",
  title =        "Intrusion detection: Approach and performance issues
                 of the {SECURENET} system",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "495--508",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901384",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thuraisingham:1994:SIF,
  author =       "Bhavani Thuraisingham",
  title =        "Security issues for federated database systems",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "509--525",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901395",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ladkin:1994:CPV,
  author =       "Peter Ladkin and Harold Thimbleby",
  title =        "Comments on a paper by Voas, {Payne} and {Cohen}: `A
                 model for detecting the existence of software
                 corruption in real time'",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "527--531",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404891901409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "532--534",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190141Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAf,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "535--535",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489190142Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Pd,
  author =       "Anonymous",
  title =        "Pages 456--535 (1994)",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "538--539",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "540--546",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harris:1994:DDS,
  author =       "Duncan Harris and David Sidwell",
  title =        "Distributed database security",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "547--557",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sommer:1994:IEA,
  author =       "Peter Sommer",
  title =        "Industrial espionage: Analysing the risk",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "558--563",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAf,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "564--569",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "570--570",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490006X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "571--571",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardjono:1994:DAR,
  author =       "Thomas Hardjono and Yuliang Zheng and Jennifer
                 Seberry",
  title =        "Database authentication revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "573--580",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laih:1994:APP,
  author =       "Chi-Sung Laih and Wen-Hong Chiou and Chin-Chen Chang",
  title =        "Authentication and protection of public keys",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "581--585",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Picciotto:1994:ELP,
  author =       "Jeffrey Picciotto and Richard D. Graubart",
  title =        "Extended labeling policies for enhanced application
                 support",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "587--599",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liaw:1994:DCK,
  author =       "Horng-Twu Liaw",
  title =        "A dynamic cryptographic key generation and information
                 broadcasting scheme in information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "601--610",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Looi:1994:NST,
  author =       "Mark H. Looi and William J. Caelli",
  title =        "A note on supplying a trusted clock via a secure
                 device",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "611--613",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "615--617",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAg,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "618--618",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Pe,
  author =       "Anonymous",
  title =        "Pages 538--618 (1994)",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:02 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "620--621",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489490040X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1994:RBBh,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "622--627",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olnes:1994:DSP,
  author =       "Jon {\O}lnes",
  title =        "Development of security policies",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "628--636",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindup:1994:CA,
  author =       "Ken Lindup",
  title =        "The cyberpunk age",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "637--645",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gentile:1994:SEI,
  author =       "Francesco Gentile and Luigi Giuri and Franco Guida and
                 Emilio Montolivo and Michele Volpe",
  title =        "Security evaluation in information technology
                 standards",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "647--650",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900442",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1994:ARAg,
  author =       "Helen Collinson",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "651--656",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900450",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "657--657",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900469",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "659--659",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mohammed:1994:DDU,
  author =       "Imtiaz Mohammed and David M. Dilts",
  title =        "Design for dynamic user-role-based security",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "661--671",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1994:MCS,
  author =       "S. H. von Solms and Isak van der Merwe",
  title =        "The management of computer security profiles using a
                 role-oriented approach",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "673--680",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900493",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:1994:ACB,
  author =       "Chin-Chen Chang and Jao-Ji Shen and Tzong-Chen Wu",
  title =        "Access control with binary keys",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "681--686",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gustafson:1994:CPM,
  author =       "H. Gustafson and E. Dawson and L. Nielsen and W.
                 Caelli",
  title =        "A computer package for measuring the strength of
                 encryption algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "687--697",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "699--701",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900523",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:GAh,
  author =       "Anonymous",
  title =        "Guide for authors",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "702--702",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404894900531",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1994:Pg,
  author =       "Anonymous",
  title =        "Pages 620--702 (1994)",
  journal =      j-COMPUT-SECUR,
  volume =       "13",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1994",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "2--2",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590073X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900756",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "4--13",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596990K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1995:BCP,
  author =       "Martin Smith and John Sherwood",
  title =        "Business continuity planning",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "14--23",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596991B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1995:RSC,
  author =       "Edwin B. Heinlein",
  title =        "The {RSA} Security Conference 1995",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "24--26",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596992C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:SAP,
  author =       "Harold Joseph Highland",
  title =        "Security Awareness and the Persuasion of Managers:
                 {Dennis Poindexter, Professionalization Directorate,
                 TGB. Arlington, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "27--27",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596994E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRUa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Using Application Profiles
                 to Detect Computer Misuse}}: Nancy Kelem and Daniel
                 Sterne, Trusted Information Systems, Mountain View, CA;
                 Debra Anderson, SRI International, Menio Park, CA; and
                 Linda Lankewicz, Spring Hill College, Mobile, AL}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "27--27",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596993D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BCM,
  author =       "Harold Joseph Highland",
  title =        "Belief in Correctness: {Marshall Abrams, The MITRE
                 Corporation, McLean, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "27--28",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596995F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:CCC,
  author =       "Harold Joseph Highland",
  title =        "Can Computer Crime be Deterred: {Sanford Sherizen,
                 Data Security Systems, Inc, Natick, MA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "28--28",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596996G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRP,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{A Pattern Matching Model for
                 Misuse Intrusion Detection}}: Sandeep Kumar and Eugene
                 Spafford, Purdue University, West Lafayette, IN}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "28--28",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596997H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRTa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Testing Intrusion Detection
                 Systems: Design Methodologies and Results from an Early
                 Prototype}}: Nicholas Puketza, Kiswanath Mukherjee,
                 Ronald Olsson and Kui Zhang, University of California,
                 Davis, CA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "28--28",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596998I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRW,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{What Color is Your
                 Assurance?}}: David Wichers, Joel Sachs and Douglas
                 Landoll, Area Systems Inc, Columbia, MD}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "28--28",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489596999J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRF,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{A Financial Management
                 Approach for Selecting Optimal, Cost-effective
                 Safeguards Upgrades for Computer- and
                 Information-Security Risk Management}}: Suzanne Smith,
                 Baranca Inc, Los Almos, NM, and Stephen Gale and
                 William Malampy, University of Pennsylvania,
                 Philadelphia, PA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "28--29",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597000Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRI,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Implementing Role Based,
                 Clark-Wilson Enforcement Rules in a Bl Online
                 Transaction Processing System}}: Barbara Smith-Thomas,
                 AT\&T Bell Laboratories, Greensboro, NC and Wang
                 Chao-Yeuh, Institute for Information Industry, Taipei,
                 Taiwan}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "29--29",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597003S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:SVP,
  author =       "Harold Joseph Highland",
  title =        "The {Sea View Prototype}: Project Summary: {Teresa
                 Lunt and Peter Boucher, SRI International, Menio Park,
                 CA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "29--29",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597001Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRTb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Towards a Formal
                 Verification of a Secure and Distributed System and its
                 Applications}}: Cui Zhang, Rob Shaw, Mark Heckman,
                 Gregory Benson, Myla Archer, Karl Levitt and Ronald
                 Olsson, Dept. Computer Science, University of
                 California, Davis, CA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "29--29",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597002R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRAa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Architectures for C2
                 DOS\slash Windows-based Personal Computers --- Securing
                 an `Undesirable' Operating System}}: Jeremy Epstein,
                 Gary Grossman, Frederick Maxwell, Nobel Veirs III,
                 Albert Donaldson, and Cornelius Hal ey; Cordant Inc,
                 Reston, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "30--30",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597005U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:PSA,
  author =       "Harold Joseph Highland",
  title =        "Partitioning the Security Analysis of Complex Systems:
                 {Howard Holm, National Security Agency, Fort Meade,
                 MD}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "30--30",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597004T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRSa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Support for Security in
                 Distributed Systems Using Messiahs}}: Steve Chapin,
                 Kent State University, Kent, OH and Eugene Spafford,
                 Purdue University, West Lafayette, IN}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "30--30",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597006V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:TSS,
  author =       "Harold Joseph Highland",
  title =        "A Taxonomy for Security Standards: {Wayne Jansen,
                 National Institute of Standards and Technology,
                 Gaithersburg, MD}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "30--30",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597007W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BREa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{The Electronic Intrusion
                 Threat to National Security and Emergency Preparedness
                 Telecommunications}}: an Awareness Document: Dr. Joseph
                 Frizzell, National Communications System, Arlington, VA
                 and Ted Phillips and Traigh Grover, Booz, Alien and
                 Hamilton Inc, McLean, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "30--31",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597008X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:AII,
  author =       "Harold Joseph Highland",
  title =        "Artificial Intelligence and Intrusion Detection:
                 Current and Future Directions: Jeremy {Frank},
                 {University} of {California}, {Davis}, {CA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "31--31",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:EEA,
  author =       "Harold Joseph Highland",
  title =        "Exporting Evaluation: an Analysis of {US} and
                 {Canadian} Criteria for Trust: {Paul Olson}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "31--31",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597009Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRV,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Virtual View Model to Design
                 a Secure Object-Oriented Database}}: N.
                 Boulahia-Cuppens, F. Cuppens, A. Gabillon, K. Yazdaman,
                 {ONERA\slash CERT}, Cedex, France}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "31--31",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRMa,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Modern Multilevel Security
                 (MLS): Practical Approaches for Integration,
                 Certification and Accreditation}}: Bill Neugent, Mike
                 Burgoon,Jeanne Firev and Mundv Rudell. The MITRE
                 Corporation. McLean, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "31--32",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597012Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:ITNa,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "33--34",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900772",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CSC,
  author =       "Helen Collinson",
  title =        "Computer Security Centre to be set up",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "35--35",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597013Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HTR,
  author =       "Helen Collinson",
  title =        "Hackers take revenge on the author of new book on
                 Cyberspace wars",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "35--35",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CD,
  author =       "Helen Collinson",
  title =        "Cops of the dataway",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "36--36",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970164",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:DSU,
  author =       "Helen Collinson",
  title =        "Dial a Star? {Utahn} faces felony for accessing
                 numbers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "36--36",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900799",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:EWS,
  author =       "Helen Collinson",
  title =        "The Electronic wallet: secure payment methods sought
                 for {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "36--36",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MTN,
  author =       "Helen Collinson",
  title =        "{Minnesota} teen nabbed in computer hacker case",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "36--36",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:LBI,
  author =       "Helen Collinson",
  title =        "{London Borough} innocent victim of computer fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "36--37",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900810",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:BCP,
  author =       "Helen Collinson",
  title =        "{BSA} cracks down on piracy in {NZ}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "37--37",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900853",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CWF,
  author =       "Helen Collinson",
  title =        "{CSIS} watchdog finds possible breach of secrets in
                 fighting high-tech crime",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "37--37",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WPV,
  author =       "Helen Collinson",
  title =        "Will Privacy vanish along with wires?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "37--37",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:URS,
  author =       "Helen Collinson",
  title =        "{US} rattles a sabre at {Chinese} pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "37--38",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPa,
  author =       "Helen Collinson",
  title =        "{SCO} patches",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "38--38",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597020B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WIS,
  author =       "Helen Collinson",
  title =        "World Institute for Security Enhancement",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "38--38",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590087X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CSB,
  author =       "Helen Collinson",
  title =        "Crypto system battles video pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "38--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900896",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ASA,
  author =       "Helen Collinson",
  title =        "Is anything safe anymore?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CPS,
  author =       "Helen Collinson",
  title =        "Copy protection, the sequel: coming to a {PC} near
                 you",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HWS,
  author =       "Helen Collinson",
  title =        "Help: working smarter lock, stock and password",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:RHH,
  author =       "Helen Collinson",
  title =        "A recipe for hacker heartburn",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SAL,
  author =       "Helen Collinson",
  title =        "Security across the {LAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900918",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SEI,
  author =       "Helen Collinson",
  title =        "Secure {EDI} over the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "39--39",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "40--41",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900950",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "43--43",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1995:TSC,
  author =       "Marshall D. Abrams and Michael V. Joyce",
  title =        "Trusted system concepts",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "45--56",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1995:TCU,
  author =       "Marshall D. Abrams and Michael V. Joyce",
  title =        "Trusted computing update",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "57--68",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970267",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1995:NTA,
  author =       "Marshall D. Abrams and Michael V. Joyce",
  title =        "New thinking about information technology security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "69--81",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "83--85",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900993",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pa,
  author =       "Anonymous",
  title =        "Pages 2--85 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:03 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "88--89",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random Bits and Bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "90--102",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970289",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mohrenschlager:1995:HCS,
  author =       "Manfred M{\"o}hrenschlager",
  title =        "Hacking: To criminalize or not? --- suggestions for
                 the legislature",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "103--112",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597029A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wolfe:1995:CSF,
  author =       "Henry B. Wolfe",
  title =        "Computer security: For fun and profit",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "113--115",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597030E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MMP,
  author =       "Helen Collinson",
  title =        "{Motorola}, {MOBIUS} pact aims at halting hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "117--117",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900535",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MVB,
  author =       "Helen Collinson",
  title =        "Mystery `virus' bugged budget",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "117--117",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970315",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HAI,
  author =       "Helen Collinson",
  title =        "Hacker alerts intuit to problems with its {US} tax
                 filing system",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "117--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970326",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MRP,
  author =       "Helen Collinson",
  title =        "Medical records, privacy on the line",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970348",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PCE,
  author =       "Helen Collinson",
  title =        "Privacy called endangered species",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900551",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPD,
  author =       "Helen Collinson",
  title =        "Software piracy declines in {Asia}, elsewhere",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970359",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SSA,
  author =       "Helen Collinson",
  title =        "Security starts with access control",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WCC,
  author =       "Helen Collinson",
  title =        "{What}'s copyrightable in computer software?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--118",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900578",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NSU,
  author =       "Helen Collinson",
  title =        "{Netscape} signs up 19 users for its system of
                 {Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "118--119",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900594",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CCP,
  author =       "Helen Collinson",
  title =        "Costly cellular phone fraud rises with number
                 `cloning'",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "119--119",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597038C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CCT,
  author =       "Helen Collinson",
  title =        "Cellular carriers try new tricks to beat bandits",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "119--119",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597036A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:UCR,
  author =       "Helen Collinson",
  title =        "Unravelling copyright rules for cyberspace",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "119--119",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597037B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CC,
  author =       "Helen Collinson",
  title =        "Calling in confidence",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "120--120",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597040H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CCN,
  author =       "Helen Collinson",
  title =        "Crash course in 'net security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "120--120",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HLA,
  author =       "Helen Collinson",
  title =        "A hacker's lines of attack",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "120--120",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895970429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SAC,
  author =       "Helen Collinson",
  title =        "Security aspects of card systems",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "120--120",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597039D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NCSa,
  author =       "Helen Collinson",
  title =        "New computer system causes chaos",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "120--121",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597043A",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:LDM,
  author =       "Helen Collinson",
  title =        "{Logicode}'s datasafe modem provides security at 28.8
                 Kbps",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "121--121",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597044B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SHC,
  author =       "Helen Collinson",
  title =        "Sign here --- caught in the cross fire of digital
                 signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "121--121",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597046D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TBD,
  author =       "Helen Collinson",
  title =        "Time bombs, drop dead devices and electronic software
                 repossession",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "121--121",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597045C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WAC,
  author =       "Helen Collinson",
  title =        "Workstation access control",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "121--121",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900616",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "122--123",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900632",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:AIV,
  author =       "Anonymous",
  title =        "Author index for volume 13",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "124--124",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:SIV,
  author =       "Anonymous",
  title =        "Subject index for volume 13",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "125--132",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900675",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRb,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "133--134",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900691",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tzong-Chen:1995:GAS,
  author =       "Wu Tzong-Chen and He Wei-Hua",
  title =        "A geometric approach for sharing secrets",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "135--145",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597047E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1995:HLC,
  author =       "Marshall D. Abrams and Jonathan D. Moffett",
  title =        "A higher level of computer security through active
                 policies",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "147--157",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597048F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hui-Min:1995:CID,
  author =       "Tsai Hui-Min and Chang Chin-Chen",
  title =        "A cryptographic implementation for dynamic access
                 control in a user hierarchy",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "159--166",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597049G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cleary:1995:IAC,
  author =       "John G. Cleary and Sean A. Irvine and Ingrid
                 Rinsma-Melchert",
  title =        "On the insecurity of arithmetic coding",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "167--180",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597050K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "181--183",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900713",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pb,
  author =       "Anonymous",
  title =        "Pages 88--184 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:04 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "186--187",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903615",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "188--196",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597051B",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1995:PIS,
  author =       "Edwin B. Heinlein",
  title =        "Principles of information systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "197--198",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597052C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hill:1995:RMC,
  author =       "Scott Hill and Martin Smith",
  title =        "Risk management and corporate security: a viable
                 leadership and business solution designed to enhance
                 corporations in the emerging marketplace",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "199--204",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597053D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:1995:BIV,
  author =       "Hyun-Jung Kim",
  title =        "Biometrics, is it a viable proposition for identity
                 authentication and access control?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "205--214",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597054E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HHT,
  author =       "Helen Collinson",
  title =        "Hot on the hackers trail",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WL,
  author =       "Helen Collinson",
  title =        "Winners and losers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:VTG,
  author =       "Helen Collinson",
  title =        "Virus threat gains momentum",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "215--216",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597055F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ISH,
  author =       "Helen Collinson",
  title =        "{Internet} security holes abound",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "216--216",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NCSb,
  author =       "Helen Collinson",
  title =        "New computer system causes chaos",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "216--216",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597056G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SA,
  author =       "Helen Collinson",
  title =        "Security alert",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "216--216",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903690",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HTH,
  author =       "Helen Collinson",
  title =        "Hacker-trackers hunt electronic cybercrooks",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "216--217",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597058I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ISB,
  author =       "Helen Collinson",
  title =        "{Internet} security boost",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597057H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:LDI,
  author =       "Helen Collinson",
  title =        "Living dangerously on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903712",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WDH,
  author =       "Helen Collinson",
  title =        "War declared on hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903739",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FCU,
  author =       "Helen Collinson",
  title =        "Firewalls come under fire",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "218--218",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597060N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FDM,
  author =       "Helen Collinson",
  title =        "Fresh drive on mobile phone fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "218--218",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597059J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SAG,
  author =       "Helen Collinson",
  title =        "Summit addresses growth, security issues for
                 {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "218--218",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903755",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SI,
  author =       "Helen Collinson",
  title =        "Securing the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "218--218",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903771",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FTI,
  author =       "Helen Collinson",
  title =        "{Feds} target the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "218--219",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597061E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:KBS,
  author =       "Helen Collinson",
  title =        "Keeping business safe on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "219--219",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597062F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPb,
  author =       "Helen Collinson",
  title =        "Secret plans",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "219--219",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597063G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SUE,
  author =       "Helen Collinson",
  title =        "Secure {Unix} for enterprise computing",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "219--219",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PYP,
  author =       "Helen Collinson",
  title =        "Protecting your privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "219--220",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597064H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CL,
  author =       "Helen Collinson",
  title =        "Cyberspace lawsuits",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "220--220",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597065I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:EPA,
  author =       "Helen Collinson",
  title =        "An efficient password authentication scheme based on a
                 unit circle",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "220--220",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597066J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "221--222",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590381X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "223--224",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Deane:1995:PAB,
  author =       "Frank Deane and Kate Barrelle and Ron Henderson and
                 Doug Mahar",
  title =        "Perceived acceptability of biometric security
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "225--231",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500005S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bishop:1995:ISS,
  author =       "Matt Bishop and Daniel V. Klein",
  title =        "Improving system security via proactive password
                 checking",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "233--249",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500003Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Booysen:1995:COI,
  author =       "H. A. S. Booysen and J. H. P. Eloff",
  title =        "Classification of objects for improved access
                 control",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "251--265",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500001O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "267--269",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903852",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pc,
  author =       "Anonymous",
  title =        "Pages 186--270 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:05 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "272--273",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900314",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "274--282",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597067K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:SIS,
  author =       "Charles Cresson Wood",
  title =        "Shifting information systems security responsibility
                 from user organizations to vendor\slash publisher
                 organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "283--284",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597068L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:IIS,
  author =       "Charles Cresson Wood and Karen Snow",
  title =        "{ISO} 9000 and information security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "287--288",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597069M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1995:RCG,
  author =       "Gerald Kovacich",
  title =        "Recovering computer-generated evidence",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "289--296",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597070Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ODC,
  author =       "Helen Collinson",
  title =        "Only disconnect: can pornography in Cyberspace be
                 regulated?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "297--297",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPR,
  author =       "Helen Collinson",
  title =        "{Swedish} pirates rumbled",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "297--297",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:UPF,
  author =       "Helen Collinson",
  title =        "{US} to propose federal agency to secure information
                 highway",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "297--298",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597071H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NSP,
  author =       "Helen Collinson",
  title =        "A new standard is proposed for electronic
                 verification",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "298--298",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597073J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:OFA,
  author =       "Helen Collinson",
  title =        "Online `firewalls' aim to keep spies in cold",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "298--298",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597072I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ITM,
  author =       "Helen Collinson",
  title =        "{IMB} targets market for anti-virus software",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--299",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900373",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SC,
  author =       "Helen Collinson",
  title =        "Stomping out cybersmut",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--299",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900411",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SCC,
  author =       "Helen Collinson",
  title =        "Security: the complex crypto relationship",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--299",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590039X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SOD,
  author =       "Helen Collinson",
  title =        "{Securicor} offers data strongroom",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--299",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597074K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TE,
  author =       "Helen Collinson",
  title =        "Tales from the encrypt",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--299",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597075L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NSR,
  author =       "Helen Collinson",
  title =        "Net security reawakening",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "299--300",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597076M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HHM,
  author =       "Helen Collinson",
  title =        "Hacker heaven: so many computers so few safe-guards",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "300--300",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900438",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SFY,
  author =       "Helen Collinson",
  title =        "Step away from that firewall with your hands up",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "300--300",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597077N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SGE,
  author =       "Helen Collinson",
  title =        "{Satan}: good or evil?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "300--300",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597078O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FBS,
  author =       "Helen Collinson",
  title =        "Forum to bring security to {ATM}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "300--301",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597079P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:BBN,
  author =       "Helen Collinson",
  title =        "Big business on the net? {Not} yet",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "301--301",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597080T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SAS,
  author =       "Helen Collinson",
  title =        "Secure all stations",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "301--301",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597081K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:BGF,
  author =       "Helen Collinson",
  title =        "Build great firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "301--302",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597082L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SDB,
  author =       "Helen Collinson",
  title =        "Safeguarding databases: basic concepts revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "302--302",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597084N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SLB,
  author =       "Helen Collinson",
  title =        "Security: on-line business: safer than you think?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "302--302",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597085O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TDR,
  author =       "Helen Collinson",
  title =        "Testing the disaster recovery plan",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "302--302",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597083M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "303--304",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900454",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "305--306",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wiseman:1995:CSS,
  author =       "Simon R. Wiseman",
  title =        "Classification services in the {SWORD} secure {DBMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "307--321",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500004R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{OShea:1995:RAR,
  author =       "Greg O'Shea",
  title =        "Redundant access rights",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "323--348",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500006T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shepherd:1995:HSS,
  author =       "Simon J. Shepherd",
  title =        "A high speed software implementation of the Data
                 Encryption Standard",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "349--357",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500007U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "358--360",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895900497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pd,
  author =       "Anonymous",
  title =        "Pages 272--360 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:06 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "362--363",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900310",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "365--371",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597086P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:LE,
  author =       "Anonymous",
  title =        "Letter to the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "373--375",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597087Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hitchings:1995:DTA,
  author =       "Jean Hitchings",
  title =        "Deficiencies of the traditional approach to
                 information security and the requirements for a new
                 methodology",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "377--383",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597088R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leach:1995:DAS,
  author =       "John Leach",
  title =        "Dynamic authentication for smartcards",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "385--389",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597089S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1995:TEC,
  author =       "Sarah Gordon",
  title =        "Technologically enabled crime: Shifting paradigms for
                 the Year 2000",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "391--402",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597090W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:ITNb,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "405--406",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900322",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HAT,
  author =       "Helen Collinson",
  title =        "Hacker, awaiting trial, attends {DefCon}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597091N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HCB,
  author =       "Helen Collinson",
  title =        "Hackers crack {BSykB} code",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900334",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:BVF,
  author =       "Helen Collinson",
  title =        "Banks, vendors focus on security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "409--410",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597092O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:DDC,
  author =       "Helen Collinson",
  title =        "Direct debiting: a case of serious fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597093P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:GHS,
  author =       "Helen Collinson",
  title =        "Gaping holes of solicitors and accountants",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "410--411",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597094Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CRS,
  author =       "Helen Collinson",
  title =        "{China}'s raids on software pirates move to interior",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597096S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PBCa,
  author =       "Helen Collinson",
  title =        "Police break {CD} pirate ring in {Cambridge}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597095R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WHS,
  author =       "Helen Collinson",
  title =        "White House seeks copyright protection for text,
                 software published online",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900346",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:JSC,
  author =       "Helen Collinson",
  title =        "A job for security counsel",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "411--412",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597097T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MTW,
  author =       "Helen Collinson",
  title =        "{Microsoft} tackles Win 95 pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "412--412",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597098U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PWP,
  author =       "Helen Collinson",
  title =        "Pssst, what's password again?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "412--412",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597099V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SIA,
  author =       "Helen Collinson",
  title =        "Are suppliers infected with an apathy virus?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "412--412",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900358",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:WVA,
  author =       "Helen Collinson",
  title =        "Word is out on virus that attacks macros",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "412--413",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597100O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CCW,
  author =       "Helen Collinson",
  title =        "Cryptic cross words",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597103H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HN,
  author =       "Helen Collinson",
  title =        "Holes in the net",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597102G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PSN,
  author =       "Helen Collinson",
  title =        "Providing a safety net",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597101F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SIT,
  author =       "Helen Collinson",
  title =        "Is security an issue? {Then} a {BBS} may be for you",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "413--414",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489690036X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FMC,
  author =       "Helen Collinson",
  title =        "A fast method for cryptanalysis of substitution
                 ciphers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597105J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:STS,
  author =       "Helen Collinson",
  title =        "Strong theoretical stenography",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597104I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "415--416",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900371",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1995:PVT,
  author =       "Sarah Gordon",
  title =        "Publication of vulnerabilities and tools",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900383",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1995:FIS,
  author =       "Bill Hancock",
  title =        "Future of {Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597108M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:1995:NPF,
  author =       "Eugene Schultz",
  title =        "A new perspective on firewall security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597107L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:1995:UFP,
  author =       "John Sherwood",
  title =        "Using firewalls to provide secure {Internet} access",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597106K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venema:1995:PS,
  author =       "Wietse Venema",
  title =        "Project {Satan}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "417--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597109N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krull:1995:CNMa,
  author =       "Alan Krull",
  title =        "Controls in the next millennium: Anticipating the
                 {IT}-enabled future",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597112N",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madsen:1995:SAP,
  author =       "Wayne Madsen",
  title =        "Securing access and privacy on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597110V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1995:RBA,
  author =       "Tom Parker",
  title =        "Role based access control",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597115Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tanner:1995:OES,
  author =       "Ray Tanner",
  title =        "Outsourcing --- Ensuring security compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597111M",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Webster:1995:SPU,
  author =       "Geoffrey Webster",
  title =        "Software Piracy --- an Update",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597113O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:WIPa,
  author =       "Charles Cresson Wood",
  title =        "Writing infosec policies",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597114P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bovelander:1995:SCB,
  author =       "Ernst Bovelander",
  title =        "Smart cards and biometrics: an overview of current
                 technologies, threats and opportunities",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "418--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597119U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brunnstein:1995:VOT,
  author =       "Prof. Klaus Brunnstein",
  title =        "Viruses, an overestimated threat?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900395",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holloway:1995:CDSa,
  author =       "Chris Holloway",
  title =        "Controlling digital signature services using a
                 smartcard",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597118T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holloway:1995:CUCa,
  author =       "Chris Holloway",
  title =        "Controlling the usage of cryptographic keys",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597116R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hruska:1995:NOS,
  author =       "Jan Hruska",
  title =        "New operating systems and old viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597117S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1995:CSI,
  author =       "Carl Meyer",
  title =        "Crypto system initialization: Simplifying the
                 distribution of initial keys",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597120Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:1995:VAS,
  author =       "John Mitchell",
  title =        "Value added system development auditing",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--419",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900401",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Farmer:1995:IVE,
  author =       "Doc Farmer and S. G. Warburg",
  title =        "Internal vs. external {IT} audits --- or --- Mapping
                 out a war zone?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "419--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597121P",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buckwell:1995:SSN,
  author =       "Mark Buckwell",
  title =        "The spook solution --- Now open for business",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420, 422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597127V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crocker:1995:MSA,
  author =       "Norman Crocker",
  title =        "{MVS\slash SMF} audit trail processing",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597122Q",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McNulty:1995:CGI,
  author =       "Lynn McNulty",
  title =        "Cryptography and the global information
                 infrastructure",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597123R",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Poole:1995:CDO,
  author =       "Vernon Poole and Dean Adams",
  title =        "Current developments in open systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597125T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reid:1995:OSSa,
  author =       "Jim Reid",
  title =        "Open systems security: Traps and pitfalls",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597124S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1995:AIO,
  author =       "Paul Smith",
  title =        "Achieving inter-operable security services in open
                 systems products",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "420--420",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597126U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Banes:1995:PLN,
  author =       "David Banes",
  title =        "Physical layer network security: What your {LAN} can
                 do for you",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900437",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Corum:1995:CSP,
  author =       "P. J. Corum",
  title =        "Client server --- Promises, problems and solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597129X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hanson:1995:IAS,
  author =       "Lesley Hanson",
  title =        "The impact of {ATM} on security in the data network",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900425",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hughes:1995:XSC,
  author =       "John Hughes",
  title =        "{X.400} Security: Current and future usage",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597128W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1995:DTF,
  author =       "Tom Mulhall",
  title =        "Dial thru' fraud the ramifications for a business",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597131S",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Newman:1995:CRS,
  author =       "Peter Newman",
  title =        "{CD}-{ROM} security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900449",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:WNS,
  author =       "Charles Cresson Wood",
  title =        "Wireless network security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--422",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971303",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kelman:1995:DLR,
  author =       "Alistair Kelman",
  title =        "Developing legal risks in multimedia",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "422--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597132T",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hiles:1995:WWM,
  author =       "Andrew Hiles",
  title =        "Why waste money on disaster recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krull:1995:MIS,
  author =       "Alan Krull",
  title =        "Marketing information systems audit",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900474",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parkin:1995:ISI,
  author =       "Rod Parkin",
  title =        "{IT} security --- an implementation strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597133U",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:1995:BCP,
  author =       "John Sherwood",
  title =        "Business continuity planning",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597137Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1995:FCI,
  author =       "Martin Smith",
  title =        "Facing the challenge of {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597134V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Taylor:1995:CRA,
  author =       "Frank Taylor",
  title =        "The changing rises associated with computer systems as
                 reflected by disaster recovery experience",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597136X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vince:1995:IPI,
  author =       "Judith Vince",
  title =        "An international perspective on {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--423",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597135W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crocker:1995:AAT,
  author =       "Norman Crocker",
  title =        "Automated audit --- Tools and techniques",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "423--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597138Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cogle:1995:S,
  author =       "Graham Cogle",
  title =        "{OS/2} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900486",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{France:1995:DPI,
  author =       "Elizabeth France",
  title =        "Data protection in the information superhighway era",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597141V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1995:SER,
  author =       "Sarah Gordon",
  title =        "Social engineering --- Recognizing intruders",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597144Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1995:DRA,
  author =       "Bill Hancock",
  title =        "Dial-up and remote access facilities for {LANs}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597142W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Milsom:1995:NS,
  author =       "Chris Milsom",
  title =        "{Novell} security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971406",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oliphant:1995:ITA,
  author =       "Alan Oliphant",
  title =        "{Internet} tools for auditors",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:SIN,
  author =       "Peter Wood",
  title =        "Security implications of network infrastructure
                 migration",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "424--424",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597143X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bolton:1995:DAT,
  author =       "Andrew Bolton",
  title =        "Derivatives and assessing their risks",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Corum:1995:OOA,
  author =       "P. J. Corum",
  title =        "Object oriented: Another silver bullet",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Curtis:1995:EWW,
  author =       "Mark Curtis",
  title =        "Evaluation of {Windows 95} and {Windows NT} security
                 controls and architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dosdale:1995:ESI,
  author =       "Terry Dosdale",
  title =        "{EDI} security and the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597145Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Galliers:1995:ATC,
  author =       "Kevin Galliers",
  title =        "{AI} techniques to counter financial fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hickson:1995:BCP,
  author =       "Nigel Hickson",
  title =        "Beyond the code of practice: New challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900516",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McNulty:1995:UAC,
  author =       "Lynn McNulty",
  title =        "{US} approaches to cryptographic key escrowing
                 (session presentation)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900504",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Osborne:1995:SIC,
  author =       "Keith Osborne",
  title =        "Security issues in contemporary banking",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896900498",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Watts:1995:SCS,
  author =       "Clive Watts",
  title =        "Secure commercial servers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--426",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971484",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardy:1995:SNC,
  author =       "Gary Hardy",
  title =        "Standards --- The need for a common framework",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "426--427",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597151Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hughes:1995:AAU,
  author =       "John Hughes",
  title =        "Auditing and accounting: Usage and requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "427--427",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489597152Z",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:1995:WBG,
  author =       "Eugene Schultz",
  title =        "Why the bad guys are winning",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "427--427",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895971532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Eg,
  author =       "Anonymous",
  title =        "Exhibitors",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "429--432",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900528",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRe,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "433--434",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489690053X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doumas:1995:DNN,
  author =       "Anastasia Doumas and Konstantinos Mavroudakis and
                 Dimitris Gritzalis and Sokratis Katsikas",
  title =        "Design of a neural network for recognition and
                 classification of computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "435--448",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500008V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kailay:1995:RPE,
  author =       "Muninder P. Kailay and Peter Jarratt",
  title =        "{RAMeX}: a prototype expert system for computer
                 security risk analysis and management",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "449--463",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500013X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardjono:1995:ASA,
  author =       "Thomas Hardjono and Jennifer Seberry",
  title =        "Applications of smartcards for anonymous and
                 verifiable databases",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "465--472",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500011V",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "473--475",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900541",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pe,
  author =       "Anonymous",
  title =        "Pages 362--475 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:07 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Eh,
  author =       "Anonymous",
  title =        "From the {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "478--479",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "480--488",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599310L",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oliver:1995:PAA,
  author =       "Claude Oliver",
  title =        "Privacy, anonymity and accountability",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "489--490",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599311C",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krull:1995:CNMb,
  author =       "Alan R. Krull",
  title =        "Controls in the next millennium: Anticipating the
                 {IT}-enabled future",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "491--495",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599312D",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reid:1995:OSSb,
  author =       "Jim Reid",
  title =        "Open systems security: Traps and pitfalls",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "496--517",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599313E",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:IUF,
  author =       "Helen Collinson",
  title =        "{Internet} users fret over spies' new role",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599314F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SFF,
  author =       "Helen Collinson",
  title =        "Security flaw found in {Netscape} software",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599315G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SHS,
  author =       "Helen Collinson",
  title =        "Six hackers stung by undercover cybercops: {Gary
                 Anthes. Computerworld, September 18, 1995, p. 12}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "518--519",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599316H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:AOG,
  author =       "Helen Collinson",
  title =        "{America} Online girds against hacker break-ins",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599317I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:DDV,
  author =       "Helen Collinson",
  title =        "Document describing virus contains one",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MWV,
  author =       "Helen Collinson",
  title =        "Malicious Word virus found on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SSb,
  author =       "Helen Collinson",
  title =        "Safe secret",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "519--520",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599318J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ELB,
  author =       "Helen Collinson",
  title =        "An expensive lesson for bulletin board user",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MCI,
  author =       "Helen Collinson",
  title =        "{Microsoft} criticized over {Internet} security
                 claims",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599319K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:RVH,
  author =       "Helen Collinson",
  title =        "In {Rindos v. Hardwick}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "520--521",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599320O",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ABF,
  author =       "Helen Collinson",
  title =        "Another brick in the firewall",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599321F",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HPD,
  author =       "Helen Collinson",
  title =        "How to protect distributed data",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599323H",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:RGS,
  author =       "Helen Collinson",
  title =        "Routers get security auditing software",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599322G",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TYV,
  author =       "Helen Collinson",
  title =        "Think you're virus-proof?. {Think} again",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "521--522",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FLI,
  author =       "Helen Collinson",
  title =        "{Feds} limit info warfare role",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599324I",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SCD,
  author =       "Helen Collinson",
  title =        "{SATAN} and {Courtney}: a devil of a team",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599325J",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TMN,
  author =       "Helen Collinson",
  title =        "Taking the measure of {NetWare} antivirus software",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489599326K",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "523--524",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "525--526",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590333X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stoll:1995:NDP,
  author =       "Frank Stoll",
  title =        "The need for decentralization and privacy in mobile
                 communications networks",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "527--539",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500014Y",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lo:1995:MMC,
  author =       "Raymond W. Lo and Karl N. Levitt and Ronald A.
                 Olsson",
  title =        "{MCF}: a malicious code filter",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "541--566",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489500012W",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "567--569",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895903356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pf,
  author =       "Anonymous",
  title =        "Pages 478--570 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:08 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "572--573",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "574--585",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816646",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holloway:1995:CUCb,
  author =       "Christopher J. Holloway",
  title =        "Controlling the use of cryptographic keys",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "587--598",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1995:I,
  author =       "Sarah Gordon",
  title =        "{Internet} 101",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "599--604",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681666X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:CAS,
  author =       "Harold Joseph Highland",
  title =        "The controlled application set paradigm for trusted
                 systems: {Daniel Sterne, Trusted Information Systems
                 Inc, Glenwood, MD, USA and Glenn Benson, European
                 Computer-Industry Research Centre, Munich, Germany}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "605--605",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816671",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRMb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Maintaining secretary and
                 integrity in multilevel databases: a practical
                 approach}}: Sushil Jajodia, George Mason University,
                 Fairfax, VA; Don Marks, Department of Defense, Ft.
                 Meade; and Elisa Bertino, Universita di Milano, Milano,
                 Italy}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "605--606",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816683",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRAb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{AIN'T misbehaving --- a
                 taxonomy of anti-intrusion techniques}}: Lawrence R.
                 Halme, Arca Systems Inc., San Jose, CA, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "606--606",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:TIL,
  author =       "Harold Joseph Highland",
  title =        "{TCP\slash IP} (lack of) security: {Jasper M.
                 Johansson, University of Maryland, College Park, MD,
                 USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "606--606",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816701",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:MPE,
  author =       "Harold Joseph Highland",
  title =        "Maintaining privacy in electronic transactions:
                 {Carnegie Mellon University, Pittsburgh, PA, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "606--607",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901280",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRSb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{A software architecture to
                 support misuse intrusion detection}}: Sandeep Kumar and
                 Eugene H. Spafford, Purdue University, West Lafayette,
                 IN, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "607--607",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816713",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRSc,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Securing local area and
                 metropolitan area network: a practical approach}}:
                 Prof. Vijay Vradharajan, University of Western Sydney,
                 Nepean, Australia}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "607--607",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816725",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRUb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Using network traffic
                 analysis as a security tool}}: Peter Troxell, Curry
                 Bartlett and Nicholas Gill, Digital Equipment Corp,
                 Beavercreek, OH, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "607--607",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816737",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:PEU,
  author =       "Harold Joseph Highland",
  title =        "A perspective of evaluation in the {UK} versus the
                 {US}: {Alan Borrett, UK ITSEC Scheme, Cheltenham,
                 Glos., UK}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "607--608",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816749",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:CFK,
  author =       "Harold Joseph Highland",
  title =        "Critical factors of key escrow encryption systems:
                 {Dorothy E. Denning, Georgetown University, Washington,
                 DC, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "608--608",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816750",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BREb,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{ECMA's approach for IT
                 security evaluations}}: Alexander Herrigel, R3 Security
                 Engineering AG, Switzerland; Roger French, Digital
                 Equipment Corp, USA; and Haruki Tabuchi, Fujitsu, Ltd,
                 Japan}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "608--608",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816774",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BREc,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Evaluting the strength of
                 ciphers}}: John C. Higgins, Brigham Young University,
                 Provo, UT, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "608--608",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816786",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:SSR,
  author =       "Harold Joseph Highland",
  title =        "Security and software reuse: {George W. Rogers, Jr.
                 and Jerry C. Crabb, The Analysis Corporation, Falls
                 Church, VA, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "608--608",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816762",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRC,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Component architectures for
                 trusted netware}}: Jeremy Epstein and Gary Grossman,
                 Cordant Inc., Reston, VA, USA; and Roger Schell,
                 Novell, Inc. Provo, UT, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "609--609",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816828",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:CPW,
  author =       "Harold Joseph Highland",
  title =        "Contingency planning: What to do when bad things
                 happen to good systems: {Jay. J. Kahn and Marshall D.
                 Abrams, The MITRE Corp., McLean, VA, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "609--609",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRO,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{An open trusted enterprise
                 network architecture}}: Gray Grossman and Jeremy
                 Epstein, Cordant, Inc., Reston, VA, USA; and Roger
                 Schell, Novell, Inc. Provo, UT, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "609--609",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816804",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:SEO,
  author =       "Harold Joseph Highland",
  title =        "Social engineering; The only real test of information
                 systems security plans: {Ira S. Winkler, Science
                 Applications International Corporation, Annapolis, MD,
                 USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "609--609",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816816",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:BRAc,
  author =       "Harold Joseph Highland",
  title =        "Book Review: {{\booktitle{Authorship analysis:
                 Identifying the author of a program}}: Ivan Krsul and
                 Eugene H. Spafford, Purdue University, West Lafayette,
                 IN, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "609--610",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681683X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:ISA,
  author =       "Harold Joseph Highland",
  title =        "{Internet} sniffer attacks: {E. Eugene Schultz, SRI
                 International, Menlo Park, CA and Thomas Longstaff,
                 Carnegie Mellon University, Pittsburgh, PA, USA}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "610--610",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816841",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:TCT,
  author =       "Harold Joseph Highland",
  title =        "The table of contents for the 1st through the 17th
                 {National Conputer Security Conferences}: {Jack
                 Holloran, National Computer Security Center and Darlene
                 Affeldt, National Security Agency}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "610--610",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816853",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:AIC,
  author =       "Helen Collinson",
  title =        "Alarm at increase in civil service crime",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "611--611",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816865",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SEW,
  author =       "Helen Collinson",
  title =        "Security expert warns of night-time intruders",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "611--611",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816877",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:TCS,
  author =       "Helen Collinson",
  title =        "Top cop says fingerprint system is fraud-beater",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "611--612",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816889",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:BTP,
  author =       "Helen Collinson",
  title =        "{BSA} toughens up on pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "612--612",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816907",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NSC,
  author =       "Helen Collinson",
  title =        "Net surfer convicted for cache of child porn disks",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "612--612",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:RTP,
  author =       "Helen Collinson",
  title =        "Raids target piracy suspects",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "612--612",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PBCb,
  author =       "Helen Collinson",
  title =        "Pressure builds on chip thieves",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "612--613",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:FPS,
  author =       "Helen Collinson",
  title =        "Faced with a password solution",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "613--613",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:JAG,
  author =       "Helen Collinson",
  title =        "Joint action group fights computer crime",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "613--613",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MSW,
  author =       "Helen Collinson",
  title =        "More security woes plague the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "613--614",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816920",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MSI,
  author =       "Helen Collinson",
  title =        "E-mail security ignored",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816932",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PYM,
  author =       "Helen Collinson",
  title =        "Protect your e-mail",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPT,
  author =       "Helen Collinson",
  title =        "Software pirates treasure Win 95",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816956",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MOS,
  author =       "Helen Collinson",
  title =        "{MCII} offers secure transaction service",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "614--615",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816968",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:OEN,
  author =       "Helen Collinson",
  title =        "Oracle extinguishes 'net security fears",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "615--615",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681697X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SCA,
  author =       "Helen Collinson",
  title =        "Sentry cuts access to naughty bits",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "615--615",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816993",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:UTA,
  author =       "Helen Collinson",
  title =        "Underground tools aid fledgling hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "615--615",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896816981",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:HSS,
  author =       "Helen Collinson",
  title =        "How secure is security?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "615--616",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817007",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:IP,
  author =       "Helen Collinson",
  title =        "Invasions of privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:IUW,
  author =       "Helen Collinson",
  title =        "{IBM} unveils web servers, {Internet} firewall",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SDI,
  author =       "Helen Collinson",
  title =        "Security and data integrity for {LANS} and {WANs}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SER,
  author =       "Helen Collinson",
  title =        "Security environment reviews",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "617--618",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901361",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "619--620",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895901388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Soh:1995:SOI,
  author =       "B. C. Soh and T. S. Dillon",
  title =        "Setting optimal intrusion-detection thresholds",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "621--631",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000178",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{deKoning:1995:MDS,
  author =       "W. Fred. de Koning",
  title =        "A methodology for the design of security plans",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "633--643",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000208",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Backhouse:1995:MCC,
  author =       "James Backhouse and Gurpreet Dhillon",
  title =        "Managing computer crime: a research outlook",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "645--651",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "653--655",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489590140X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Pg,
  author =       "Anonymous",
  title =        "Pages 572--655 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:09 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ej,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "658--659",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900268",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1995:RBBh,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "660--666",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1995:WIPb,
  author =       "Charles Cresson Wood",
  title =        "Writing infosec policies",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "667--674",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Duncan:1995:TSC,
  author =       "Rebecca J. Duncan",
  title =        "There are some cracks in the cornerstone of
                 information security",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "675--680",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681707X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holloway:1995:CDSb,
  author =       "Christopher J. Holloway",
  title =        "Controlling digital signature services using a
                 smartcard",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "681--690",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindup:1995:NMI,
  author =       "Kenneth R. Lindup",
  title =        "A new model for information security policies",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "691--695",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SSc,
  author =       "Helen Collinson",
  title =        "Safe and secure",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "696--696",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:VWE,
  author =       "Helen Collinson",
  title =        "Virus wars escalate",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "696--696",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:DPL,
  author =       "Helen Collinson",
  title =        "Digital privacy \ldots{} take two",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "696--697",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681710X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:NUN,
  author =       "Helen Collinson",
  title =        "{NT}, {Unix} network security shapes up",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "697--697",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PLW,
  author =       "Helen Collinson",
  title =        "Present law will not stop the virus writers",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "697--697",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PNA,
  author =       "Helen Collinson",
  title =        "A piece of the 'Net action",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "697--697",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:PFP,
  author =       "Helen Collinson",
  title =        "{PeopleSoft} fixes password security flaw",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "697--698",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CMP,
  author =       "Helen Collinson",
  title =        "Cyberspace magistrates are proposed",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "698--698",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:GAF,
  author =       "Helen Collinson",
  title =        "Group assails federal security proposals",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "698--698",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817184",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SM,
  author =       "Helen Collinson",
  title =        "Safety on the move",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "698--698",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SSBa,
  author =       "Helen Collinson",
  title =        "Simplified sign-on brings enhanced security features",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "698--698",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:ISS,
  author =       "Helen Collinson",
  title =        "Industrial-strength security for the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "699--699",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817202",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:OVL,
  author =       "Helen Collinson",
  title =        "Old viruses licked, but new ones find fodder in
                 {Windows} 95",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "699--699",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SPL,
  author =       "Helen Collinson",
  title =        "Security plans lag computer crime rate",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "699--699",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:CSE,
  author =       "Helen Collinson",
  title =        "Cracking a social engineer",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "700--700",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:MRC,
  author =       "Helen Collinson",
  title =        "Making the right connections",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "700--700",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817251",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:OI,
  author =       "Helen Collinson",
  title =        "Operational insurance",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "700--700",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817226",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:AVS,
  author =       "Helen Collinson",
  title =        "Anti-virus software",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "700--701",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489681724X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:EHS,
  author =       "Helen Collinson",
  title =        "Economical, high-security payphone systems with
                 {Watermark Magnetics} cards from {Ascom}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "701--701",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:H,
  author =       "Helen Collinson",
  title =        "5 {H5a4BRTES7S}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "701--701",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1995:SO,
  author =       "Helen Collinson",
  title =        "Security overkill?",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "701--701",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896817263",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "702--703",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900322",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:IBRh,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "705--706",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ekenberg:1995:CMM,
  author =       "Love Ekenberg and Subhash Oberoi and Istv{\'a}n Orci",
  title =        "A cost model for managing information security
                 hazards",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "707--717",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abrams:1995:SC,
  author =       "Marshall D. Abrams and Marvin V. Zelkowitz",
  title =        "Striving for correctness",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "719--738",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "739--741",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404895900365",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1995:Ph,
  author =       "Anonymous",
  title =        "Pages 658--741 (1995)",
  journal =      j-COMPUT-SECUR,
  volume =       "14",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1995",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "2--2",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900553",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900565",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "4--11",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{David:1996:NFV,
  author =       "Jon David",
  title =        "The new face of the virus threat",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "13--16",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896876188",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buckwell:1996:SSN,
  author =       "Mark Buckwell",
  title =        "The spook solution --- Now open for business",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "17--26",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489687619X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Smith:1996:AIS,
  author =       "Paul Smith",
  title =        "Achieving interoperable security services in open
                 systems products",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "27--37",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896876206",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moreau:1996:PFP,
  author =       "Thierry Moreau",
  title =        "A probabilistic flaw in {PGP} design?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "39--43",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896876218",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:AAR,
  author =       "Helen Collinson",
  title =        "Abstract of article and recent literature",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "44--49",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489687622X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "50--51",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900589",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "53--54",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Eloff:1996:SCD,
  author =       "J. H. P. Eloff and R. Holbein and S. Teufel",
  title =        "Security classification for documents",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "55--71",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hwang:1996:ACS,
  author =       "Min-Shiang Hwang and Wen-Guey Tzeng and Wei-Pang
                 Yang",
  title =        "An access control scheme based on {Chinese} remainder
                 theorem and time stamp concept",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "73--81",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404895000283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "83--85",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896900607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pa,
  author =       "Anonymous",
  title =        "Pages 2--86 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "88--89",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "90--99",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1996:MRS,
  author =       "Edwin B. Heinlein",
  title =        "Medical records security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "100--102",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1996:NDC,
  author =       "Frederick B. Cohen",
  title =        "A note on distributed coordinated attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "103--121",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:ESG,
  author =       "Helen Collinson",
  title =        "Encryption spec gains momentum",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "123--123",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:HFH,
  author =       "Helen Collinson",
  title =        "{HP} finds high security `net niche",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "123--123",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:KCC,
  author =       "Helen Collinson",
  title =        "{Kerberos} code crack raises broader issues",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "123--123",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:FGW,
  author =       "Helen Collinson",
  title =        "Firewall gets {Web} capabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "123--124",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:FSU,
  author =       "Helen Collinson",
  title =        "Firewall services unveiled",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "124--124",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:NGM,
  author =       "Helen Collinson",
  title =        "{NT} gets more secure",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "124--124",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:SRR,
  author =       "Helen Collinson",
  title =        "Security risk remains for {Web} mail",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "124--124",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489689328X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:CGT,
  author =       "Helen Collinson",
  title =        "Cylink, {GTE} target {ATM} encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "124--125",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489689331X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:EEF,
  author =       "Helen Collinson",
  title =        "Expert: encryption flaws no secret",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "125--125",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:OSP,
  author =       "Helen Collinson",
  title =        "Online security a pipe dream?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "125--125",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:SCS,
  author =       "Helen Collinson",
  title =        "{Swiss}-cheese secutity",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "125--125",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:SFC,
  author =       "Helen Collinson",
  title =        "Still a few chinks in {Java}'s armour",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "125--125",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:WSM,
  author =       "Helen Collinson",
  title =        "Win 95 security measures mollify users",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "125--126",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:JCT,
  author =       "Helen Collinson",
  title =        "{Javascript} can trace user tracks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "126--126",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:MPG,
  author =       "Helen Collinson",
  title =        "E-mail privacy: a glass almost half full",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "126--126",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:UST,
  author =       "Helen Collinson",
  title =        "{Uncle Sam} has three-tier scheme for data security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "126--126",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:WSF,
  author =       "Helen Collinson",
  title =        "Webscan sets up `firewall'",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "126--126",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:LSS,
  author =       "Helen Collinson",
  title =        "{DE-light} shadowed by security concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "126--127",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:ANS,
  author =       "Helen Collinson",
  title =        "Adding `net security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:FTH,
  author =       "Helen Collinson",
  title =        "Firewall turns up the heat on {Internet} hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489689345X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:ILY,
  author =       "Helen Collinson",
  title =        "Intranets: living in your own private {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:SS,
  author =       "Helen Collinson",
  title =        "The secret struggle",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:BH,
  author =       "Helen Collinson",
  title =        "Battening down the hatches",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "127--128",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collinson:1996:ISH,
  author =       "Helen Collinson",
  title =        "{Internet} security: how much is enough?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "128--128",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896893473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "129--130",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SIVa,
  author =       "Anonymous",
  title =        "Subject index for volume 14",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "131--136",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:AIV,
  author =       "Anonymous",
  title =        "Author index for volume 14",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "137--138",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "139--140",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tanaka:1996:CSI,
  author =       "Kiyoto Tanaka and Hiroyuki Matsumoto and Ikuro
                 Oyaizu",
  title =        "A confidentiality system for {ISDN} inter-{PC}
                 high-speed file transfer",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "141--155",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spruit:1996:ISD,
  author =       "Marcel E. M. Spruit and Maarten Looijen",
  title =        "{IT} security in {Dutch} practice",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "157--170",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Manber:1996:SSM,
  author =       "Udi Manber",
  title =        "A simple scheme to make passwords based on one-way
                 functions much harder to crack",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "171--176",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489600003X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "177--179",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902850",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pb,
  author =       "Anonymous",
  title =        "Pages 88--179 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "182--183",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBc,
  author =       "Harold Joseph Highland",
  title =        "Random Bits and Bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "184--197",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489689780X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miller:1996:EWS,
  author =       "Nigel Miller",
  title =        "Establishing web sites --- legal issues and risks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "198--202",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896897811",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blatchford:1996:IP,
  author =       "Clive Blatchford",
  title =        "{Internet} as a Pornotopia?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "203--208",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896897823",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evans:1996:IPP,
  author =       "Paul Evans",
  title =        "Information protection for publishers",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "209--211",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896897835",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Born:1996:ELO,
  author =       "Eike Born",
  title =        "Enforcing legal ownership rights by an access control
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "212--220",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896897847",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:BRA,
  author =       "Helen Meyer",
  title =        "Bank restless with app-level security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "221--221",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896902126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CCC,
  author =       "Helen Meyer",
  title =        "Cypherwiz cracks cybersecurity",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "221--221",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896897859",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:AAA,
  author =       "Helen Meyer",
  title =        "Access all areas",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "221--222",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489690214X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DTC,
  author =       "Helen Meyer",
  title =        "Desperate times call for desperate measures",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "222--222",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FL,
  author =       "Helen Meyer",
  title =        "Firewalls light up",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "222--222",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WAU,
  author =       "Helen Meyer",
  title =        "{Windows} 95 antivirus utilities: the latest in {PC}
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "222--222",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:BBP,
  author =       "Helen Meyer",
  title =        "Biology battles {PC} viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "222--223",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DSH,
  author =       "Helen Meyer",
  title =        "Digital signatures: how they work",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "223--223",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SSP,
  author =       "Helen Meyer",
  title =        "Setting up a security perimeter for distributed
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "223--223",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:RS,
  author =       "Helen Meyer",
  title =        "Real security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "223--224",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CCW,
  author =       "Helen Meyer",
  title =        "Cracking the complex world of security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "224--224",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:KYN,
  author =       "Helen Meyer",
  title =        "Keep your network virus-free",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "224--224",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IBI,
  author =       "Helen Meyer",
  title =        "{InterScan} blocks {Internet} viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "224--225",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DEP,
  author =       "Helen Meyer",
  title =        "Decoding encryption policy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WSH,
  author =       "Helen Meyer",
  title =        "Will spies hold your keys",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:YDL,
  author =       "Helen Meyer",
  title =        "Your defensive line",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:F,
  author =       "Helen Meyer",
  title =        "Firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "225--226",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "227--228",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "229--230",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shiuh-Jeng:1996:SCB,
  author =       "Wang Shiuh-Jeng and Chang Jin-Fu",
  title =        "Smart card based secure password authentication
                 scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "231--237",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{deRu:1996:RAM,
  author =       "W. G. de Ru and J. H. P. Eloff",
  title =        "Risk analysis modelling with the use of fuzzy logic",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "239--248",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jing-Jang:1996:CAS,
  author =       "Hwang Jing-Jang",
  title =        "A conventional approach to secret balloting in
                 computer networks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "249--262",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "263--266",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pc,
  author =       "Anonymous",
  title =        "Pages 182--266 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:12 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "268--269",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBd,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "270--280",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1996:ISM,
  author =       "Rossouw von Solms",
  title =        "Information security management: the second
                 generation",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "281--288",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889395",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lemieux:1996:URT,
  author =       "Jacques R. Lemieux",
  title =        "Using {RAD} tools to develop secure client\slash
                 server applications",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "289--295",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889401",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:1996:ISC,
  author =       "Thomas Finne",
  title =        "The information security chain in a company",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "297--316",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889413",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SRS,
  author =       "Helen Meyer",
  title =        "Security risk or security solution?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "317--317",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889437",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WDF,
  author =       "Helen Meyer",
  title =        "{Web} developers face security quandary",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "317--317",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889425",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PSD,
  author =       "Helen Meyer",
  title =        "Pstt! {Security} designed for your eyes only",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "317--318",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889449",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:NSS,
  author =       "Helen Meyer",
  title =        "Net server to secure smaller offices",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "318--318",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:NSW,
  author =       "Helen Meyer",
  title =        "In the 'net shall we trust",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "318--318",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889486",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SGS,
  author =       "Helen Meyer",
  title =        "Servers get single sign-on",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "318--318",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889450",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WHL,
  author =       "Helen Meyer",
  title =        "White House launches cybershield",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "318--318",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889474",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PBY,
  author =       "Helen Meyer",
  title =        "{Puffer 2.0} buys you some e-mail security via easy
                 encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "318--319",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889498",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FLW,
  author =       "Helen Meyer",
  title =        "Fear and loathing on the World Wide {Web}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "319--319",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896902175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PW,
  author =       "Helen Meyer",
  title =        "Protection on the web",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "319--319",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889516",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SIL,
  author =       "Helen Meyer",
  title =        "Security issues lurk behind bank doors",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "319--319",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889504",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IS,
  author =       "Helen Meyer",
  title =        "Inner security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "319--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889528",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CER,
  author =       "Helen Meyer",
  title =        "A computer emergency response team policy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889565",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DSR,
  author =       "Helen Meyer",
  title =        "Data security report",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MST,
  author =       "Helen Meyer",
  title =        "Mobile secure telephones",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889541",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PSU,
  author =       "Helen Meyer",
  title =        "Providing security for {Unix} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489688953X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TFH,
  author =       "Helen Meyer",
  title =        "Tough firewalls help users avoid getting burned",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889553",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TTR,
  author =       "Helen Meyer",
  title =        "Teleworking: threats, risks and solutions",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "320--320",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896902199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:BAE,
  author =       "Helen Meyer",
  title =        "A business approach to effective information
                 technology risk analysis and management",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889619",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CDG,
  author =       "Helen Meyer",
  title =        "Constructing difficult-to-guess passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889589",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CSI,
  author =       "Helen Meyer",
  title =        "Commercial security on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:HH,
  author =       "Helen Meyer",
  title =        "Hazards of hooking up",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889620",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:HSY,
  author =       "Helen Meyer",
  title =        "How safe is your {LAN}?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889632",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PYL,
  author =       "Helen Meyer",
  title =        "Protecting your link to the Net",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--321",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:ISB,
  author =       "Helen Meyer",
  title =        "Information security in business environments",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "321--322",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889644",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:ISH,
  author =       "Helen Meyer",
  title =        "{Internet} security: how much is enough?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "322--322",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889656",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PMT,
  author =       "Helen Meyer",
  title =        "A proposed mode for {triple-DES} encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "322--322",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896889668",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Cd,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "323--324",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "325--326",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Borrell:1996:ISV,
  author =       "Joan Borrell and Josep Rif{\`a}",
  title =        "An implementable secure voting scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "327--338",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Juang:1996:CFS,
  author =       "Wen-Shenq Juang and Chin-Laung Lei",
  title =        "A collision-free secret ballot protocol for
                 computerized general elections",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "339--348",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "349--351",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pd,
  author =       "Anonymous",
  title =        "Pages 268--351 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:13 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "354--355",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903521",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBe,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "356--366",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903533",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1996:CSC,
  author =       "Edwin B. Heinlein",
  title =        "Computer security in {China}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "369--375",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825594",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1996:ECR,
  author =       "Rolf T. Moulton and Mark E. Moulton",
  title =        "Electronic communications risk management: a checklist
                 for business managers",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "377--386",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825600",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:ITN,
  author =       "Dr. Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "387--390",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:HTS,
  author =       "Anonymous",
  title =        "An hierarchical threshold scheme with unique partial
                 keys: {H. Hassler, V. Hassler, and R. Posch, Institute
                 for Applied Information Processing and Communications,
                 Graz, Austria}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "393--393",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825636",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISC,
  author =       "Anonymous",
  title =        "{IFIP\slash SEC'96} conference proceeding",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "393--393",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825624",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BRE,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Efficient and probably
                 secure key agreement}}: N. Alexandris, V.
                 Chrissikopoulos and D. Peppes, University of Piraeus,
                 Greece and M. Burmester, R.H.-University of London,
                 Surrey, UK}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "394--394",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825673",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BRI,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Internetwork access control
                 using public key certificates}}: H. Park and R. Chow,
                 Computer and Information Sciences and Engineering
                 Department, University of Florida, Gainesville, FL}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "394--394",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825661",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SEM,
  author =       "Anonymous",
  title =        "Securely executing multilevel transactions: {S.
                 Jajodia, K. P. Smith. B. T. Blaustein, and L.
                 Notargiacomo, The MITRE Corporation, McLean, VA}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "394--394",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825648",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SQA,
  author =       "Anonymous",
  title =        "Software quality assurance: the underlying framework
                 for achieving secure and reliable software systems: {S.
                 A. Frangos, Intrasoft, Athens, Greece}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "394--394",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682565X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DRK,
  author =       "Anonymous",
  title =        "{Distributed registration and key distribution
                 (DiRK)}: {R. Oppliger, University of Berne, Institute
                 for Computer Science, Berne, Switzerland and Andres
                 Albanese, International Computer Science Institute,
                 Berkeley, CA}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "394--395",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825685",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ADS,
  author =       "Anonymous",
  title =        "An attack detection systems for secure computer
                 systems --- Design of the {ADS}: {I. Kantzavelou and A.
                 Patel, Department of Computer Science, University
                 College Dublin Belfired, Dublin, Ireland}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "395--395",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825727",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IMA,
  author =       "Anonymous",
  title =        "Intention modelling: Approximating computer user
                 intentions for detection and prediction of intrusions:
                 {T. Spyrou and J. Darzentas, Department of Mathematics
                 University of the Aegean, Greece}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "395--395",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825703",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BRM,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{MoFAC: a model for
                 fine-grained access control}}: J. S. von Solms, M. S.
                 Olivier and S. H. von Solms, Department of Computer
                 Science, Rand Afrikaans University, Johannesburg, South
                 Africa}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "395--395",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825697",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:TAH,
  author =       "Anonymous",
  title =        "A taxonomy for analyzing hazards to information
                 systems: {R. Baskerville, Copenhagen Business School,
                 Frederiksberg, Denmark}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "395--395",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825715",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISPa,
  author =       "Anonymous",
  title =        "{IT} security and privacy education: {L. Yngstrom,
                 Department of Computer and Systems Sciences, Stockholm
                 University and Royal Institute of Technology, Kista,
                 Sweden}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "395--396",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825739",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CKD,
  author =       "Anonymous",
  title =        "Cryptographic key distribution and authentication
                 protocols for secure group communication: {A. C. M.
                 Hutchison and K. Bauknecht, Department of Computer
                 Science, University of Zurich, Switzerland}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "396--396",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825740",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BRS,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Security profile for
                 interconnected open distributed systems with varying
                 vulnerability}}: N. Nikitakos, Hellenic Naval Academy,
                 Piraeus, Greece; S. Gritzalis and P. Georgiadis,
                 University of Athens, Athens, Greece}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "396--396",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825752",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:EPS,
  author =       "Anonymous",
  title =        "Elite panel slams {US} crypto policy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "397--397",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825764",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:PM,
  author =       "Anonymous",
  title =        "Password master",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "397--397",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896903545",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:NPP,
  author =       "Helen Meyer",
  title =        "Net porn prosecutions would be a `nightmare'",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "397--397",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825776",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ICD,
  author =       "Anonymous",
  title =        "Industry to {Clinton}: drop encryption policy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "397--398",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BMV,
  author =       "Anonymous",
  title =        "Beware of a macro virus epidemic",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "398--398",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825806",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:PI,
  author =       "Anonymous",
  title =        "Privacy and the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "398--398",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682579X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SW,
  author =       "Anonymous",
  title =        "The secret war",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "398--399",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825818",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DMI,
  author =       "Anonymous",
  title =        "In defence of {MoD IT} privatization",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "399--399",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825855",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DMS,
  author =       "Anonymous",
  title =        "Does {Microsoft} have security all locked up?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "399--399",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682582X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:KIL,
  author =       "Anonymous",
  title =        "Keeping it legit",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "399--399",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825831",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SIA,
  author =       "Anonymous",
  title =        "Secure {IP} access at last with virtual {TCP} Online",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "399--399",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825843",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DBI,
  author =       "Anonymous",
  title =        "Doing business on the {Internet}: marketing and
                 security aspects",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "400--400",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825892",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DDN,
  author =       "Anonymous",
  title =        "Danger! {Deadly} new computer viruses want to kill
                 your {PC}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "400--400",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825879",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:PSS,
  author =       "Anonymous",
  title =        "A policy for sending secret information over
                 communications networks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "400--400",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825867",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:TC,
  author =       "Anonymous",
  title =        "Tales from the crypt",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "400--400",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825909",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:TYP,
  author =       "Anonymous",
  title =        "Testing your plan is more important than the plan
                 itself",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "400--400",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825880",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ERS,
  author =       "Anonymous",
  title =        "Is encryption the road to security?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "401--401",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:FSR,
  author =       "Anonymous",
  title =        "Factors in the selection of a risk assessment method",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "401--401",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:FTB,
  author =       "Anonymous",
  title =        "{Feds} turn blind eye to systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "401--401",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825910",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IOC,
  author =       "Anonymous",
  title =        "Information owners, custodians and users",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "401--401",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:WSS,
  author =       "Anonymous",
  title =        "{Web} server: security lockdown",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "401--402",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825958",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ACS,
  author =       "Anonymous",
  title =        "Access control systems: from host-centric to net-work
                 centric computing",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "402--402",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825971",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:AOS,
  author =       "Anonymous",
  title =        "Approach to object security in Distributed {SOM}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "402--402",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682596X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ce,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "403--404",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISF,
  author =       "Anonymous",
  title =        "{Internet} security --- firewall horror stories: {Dr.
                 Stuart Broderick, Zergo}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "405--405",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISPb,
  author =       "Anonymous",
  title =        "{Intranet} security: {Peter} Wood, First Base",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "405--405",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896825983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SOV,
  author =       "Anonymous",
  title =        "Some observations on vulnerabilities: {Prof. Gene
                 Spafford, Purdue University}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "405--405",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SIVb,
  author =       "Anonymous",
  title =        "Security issues in the virtual corporation: {Bob
                 Frank, SRI International}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "405--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CGI,
  author =       "Anonymous",
  title =        "Corporate governance and {IT}: {Chris Hurford, Audit
                 Commission}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CSIa,
  author =       "Anonymous",
  title =        "Crypto system initialization: Simplifying the
                 distribution of initial keys: Carl {Meyer}, {IBM}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:FDC,
  author =       "Anonymous",
  title =        "Fundamental {DES} design concepts: Carl {Meyer},
                 {IBM}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IVD,
  author =       "Anonymous",
  title =        "{Internet = Virusnet}?: {Dr. David Aubrey-Jones,
                 Reflex Magnetics}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SMD,
  author =       "Anonymous",
  title =        "{SALSA}: a method for developing the enterprise
                 security architecture and strategy: {John Sherwood}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682606X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ASQ,
  author =       "Anonymous",
  title =        "Ask stupid questions; Listen for the unsaid: the {EDP}
                 auditor as consultant: {Alan Krull}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:NIS,
  author =       "Anonymous",
  title =        "The new information security age --- electronic
                 commerce and trusted third parties: {Professor Henry
                 Beker, Zergo Holdings plc.}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:RAI,
  author =       "Anonymous",
  title =        "Reviewing and assessing {IT} projects under
                 development: {Paul Williams, Binder Hamlyn, Anderson
                 Worldwide}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:RSC,
  author =       "Anonymous",
  title =        "Right sizing without capsizing: {P. J. Corum, The
                 Corum Group}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DUS,
  author =       "Anonymous",
  title =        "Dealing with a {Unix} system penetration: {Steve
                 Bailey, Reflex Magnetics}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "409--410",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CCT,
  author =       "Anonymous",
  title =        "Countering chip theft: Philip A Clearly, Probe {FX}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:PAH,
  author =       "Anonymous",
  title =        "Practical application of high level risk analysis and
                 security healthchecks for telecommunications systems:
                 {Kevin Sloan, Syntegra Ltd. SISL Operations}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:PFS,
  author =       "Anonymous",
  title =        "A practical framework for secure corporate
                 teleworking: Mark {Curtis}, {PC} Security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:TFE,
  author =       "Anonymous",
  title =        "Telecommunications fraud the evolving threat: {Tom
                 Mulhall, BT}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BCP,
  author =       "Anonymous",
  title =        "Business continuity planning: {John Sherwood}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:DRP,
  author =       "Anonymous",
  title =        "Disaster recovery: the people issues: {Andrew} Hiles,
                 Survive!",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISB,
  author =       "Anonymous",
  title =        "{IT} security is a business issue not a technical one:
                 {Rod Parkin}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:NDC,
  author =       "Anonymous",
  title =        "Network disaster contingency planning: {Peter} Wood,
                 First Base",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826204",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SCF,
  author =       "Anonymous",
  title =        "{SAP} --- Control and fraud prevention strategies:
                 {Nigel Iyer, Network Security Management}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CSIb,
  author =       "Anonymous",
  title =        "{CIPFA} survey of {IT} audit in {UK} public service
                 organizations 1996: {Vernon Poole, Aid to Industry}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/016740489682623X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IAR,
  author =       "Anonymous",
  title =        "{Intranet} as an audit resource: {Doc Farmer, S. G.
                 Warburg}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISRa,
  author =       "Anonymous",
  title =        "It's the Infrastructure, stupid: {Ray Kaplan}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:MSC,
  author =       "Anonymous",
  title =        "Mobile state --- challenges for the 21st century:
                 {August Bequai}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "413--413",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826228",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CCA,
  author =       "Anonymous",
  title =        "Cashless cybercrime: {August Bequai}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "414, 417",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826290",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CLH,
  author =       "Anonymous",
  title =        "Closing the loopholes in host-based authentication:
                 {Jim Reid}, {RTFM}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826265",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IWY,
  author =       "Anonymous",
  title =        "Information warfare: Your company needs you!: Tim
                 {Porter}, Bull Information Systems",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826277",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:OCR,
  author =       "Anonymous",
  title =        "One company's roadmap to securing it's intranet: {Bob
                 Frank, SRI International}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826289",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SRA,
  author =       "Anonymous",
  title =        "Securing remote access to corporate systems: {Colin}
                 Tankard, Digital Pathways",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "414--414",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826253",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CEO,
  author =       "Anonymous",
  title =        "Computer evidence: an overview of forensic procedures,
                 tools and techniques: Edward Wilding, Network Security
                 Management",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826332",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:GGA,
  author =       "Anonymous",
  title =        "{GSSP (Generally-Accepted system Security
                 Principles)}: a trip to {Abilene}: {Alan Krull}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826307",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:SBS,
  author =       "Anonymous",
  title =        "{Smartcards} --- is {Britain} smart enough: {Alan
                 Laird, Bull Information Systems}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826320",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:TBS,
  author =       "Anonymous",
  title =        "The truth behind single sign-on: {Gary Hardy, Zergo}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "417--417",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ISRb,
  author =       "Anonymous",
  title =        "Intelligent security reporting --- auditing security
                 logs: {Norman Crocker}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "417--418",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BDP,
  author =       "Anonymous",
  title =        "Blind date --- problems with the year 2000: {Doc
                 Farmer, S. G. Warburg}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:BVP,
  author =       "Anonymous",
  title =        "Blaming the victim: {Prof. Gene Spafford, Purdue
                 University}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "418--418",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896826368",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:CEa,
  author =       "Anonymous",
  title =        "{COMPSEC} '96 exhibitors",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "419--420, 423--428",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903569",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRe,
  author =       "Anonymous",
  title =        "International Board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "429--430",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tzong-Chen:1996:API,
  author =       "Wu Tzong-Chen and Sung Hung-Sung",
  title =        "Authenticating passwords over an insecure channel",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "431--439",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{White:1996:CSM,
  author =       "Gregory White and Vdo Pooch",
  title =        "Cooperating security managers: Distributed intrusion
                 detection systems",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "441--450",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896000120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "451--453",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896903582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pe,
  author =       "Anonymous",
  title =        "Pages 354--453 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:14 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "456--457",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBf,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "458--469",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Frank:1996:SIV,
  author =       "Robert L. (Bob) Frank",
  title =        "Security issues in the virtual corporation",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "471--476",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindup:1996:RIS,
  author =       "Ken Lindup",
  title =        "The role of information security in corporate
                 governance",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "477--485",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1996:ENS,
  author =       "Gerald L. Kovacich",
  title =        "Establishing a network security programme",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "486--498",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heinlein:1996:YRS,
  author =       "Edwin B. Heinlein",
  title =        "Year 2000 --- a real {IS} security issue",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "499--500",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:1996:SMD,
  author =       "John Sherwood",
  title =        "{SALSA}: a method for developing the enterprise
                 security architecture and strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "501--506",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Press:1996:OOC,
  author =       "Jim Press",
  title =        "Object oriented cryptographic facility design: Export
                 considerations",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "507--514",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FTC,
  author =       "Helen Meyer",
  title =        "Firm turns {China} piracy into contract",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404896901078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SCP,
  author =       "Helen Meyer",
  title =        "Security for cellular phones on the way",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:UAP,
  author =       "Helen Meyer",
  title =        "{US} assailed on plans for encryption export",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IPR,
  author =       "Helen Meyer",
  title =        "{Internet} poses risk, {CIBC} head says",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SGU,
  author =       "Helen Meyer",
  title =        "Security gap uncovered in {ActiveX} components",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WNG,
  author =       "Helen Meyer",
  title =        "{Windows NT} to gain built-in security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WSK,
  author =       "Helen Meyer",
  title =        "{Web} security is key to {HP}'s 'net strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489783129X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FMS,
  author =       "Helen Meyer",
  title =        "Feeling more secure about intranets",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "516--517",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489783132X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:AHW,
  author =       "Helen Meyer",
  title =        "Attack highlights {Web} security risks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:GPN,
  author =       "Helen Meyer",
  title =        "Getting personal on the net",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SSF,
  author =       "Helen Meyer",
  title =        "{Seattle} software's firewall keeps watch",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:ULK,
  author =       "Helen Meyer",
  title =        "Under lock and key",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "517--518",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:HC,
  author =       "Helen Meyer",
  title =        "Hacker with a cause?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SB,
  author =       "Helen Meyer",
  title =        "Security blanket",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:UFS,
  author =       "Helen Meyer",
  title =        "Users fall short on 'net security planning",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "518--519",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CD,
  author =       "Helen Meyer",
  title =        "Cope with disaster",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FFI,
  author =       "Helen Meyer",
  title =        "Firewall fights intranet threat",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SS,
  author =       "Helen Meyer",
  title =        "Selling security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:T,
  author =       "Helen Meyer",
  title =        "The {I}-team",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "519--520",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MGT,
  author =       "Helen Meyer",
  title =        "Managers get third access security spec",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897831446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Cf,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "521--522",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "523--524",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489690111X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Varadharajan:1996:ESP,
  author =       "Vijay Varadharajan and Claudio Calvelli",
  title =        "Extending the schematic protection {model-II.}
                 Revocation",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "525--536",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yen:1996:CRM,
  author =       "Sung-Ming Yen",
  title =        "Cryptanalysis and repair of the multi-verifier
                 signature with verifier specification",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "537--544",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "545--547",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pf,
  author =       "Anonymous",
  title =        "Pages 456--547 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:15 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Eh,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "550--551",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:RBBg,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "552--560",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Porter:1996:IWY,
  author =       "Tim Porter",
  title =        "Information warfare --- Your company needs you!",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "561--566",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krull:1996:GGA,
  author =       "Alan R. Krull",
  title =        "{GSSP (Generally-Accepted System Security
                 Principles)}: a trip to {Abilene}?",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "567--575",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clark:1996:CCE,
  author =       "Andrew J. Clark and Sapher Services Ltd",
  title =        "Cryptographic controls --- the eternal triangle",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "576--584",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CVM,
  author =       "Helen Meyer",
  title =        "Computer viruses: myth vs reality",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "585--585",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489788114X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:NUE,
  author =       "Helen Meyer",
  title =        "The new {US} encryption policy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "585--585",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CHT,
  author =       "Helen Meyer",
  title =        "Computer hackers turn to pager systems",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "585--586",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:AF,
  author =       "Helen Meyer",
  title =        "Antivirus firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "586--586",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DSF,
  author =       "Helen Meyer",
  title =        "Denial of service, the future of dirty tricks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "586--586",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:HPY,
  author =       "Helen Meyer",
  title =        "How to protect your data",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "586--587",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MIA,
  author =       "Helen Meyer",
  title =        "Making {Internet} access safe",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "587--587",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MIS,
  author =       "Helen Meyer",
  title =        "Making the {Internet} safe for e-commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "587--587",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CMC,
  author =       "Helen Meyer",
  title =        "Cheyenne, {McAfee} cure software viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "587--588",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CA,
  author =       "Helen Meyer",
  title =        "Controlling access",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "588--588",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TSY,
  author =       "Helen Meyer",
  title =        "Tips for safeguarding your digital assets",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "588--588",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:GRA,
  author =       "Helen Meyer",
  title =        "Getting real about virtual private data nets",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "588--589",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SJR,
  author =       "Helen Meyer",
  title =        "Striking just the right firewall match",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "589--589",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:WSS,
  author =       "Helen Meyer",
  title =        "{Web} server: security lockdown",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "589--589",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:VSB,
  author =       "Helen Meyer",
  title =        "Viruses: sucker bait",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "589--590",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489788128X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SSI,
  author =       "Helen Meyer",
  title =        "Strategic security for {IP} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "590--590",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SYM,
  author =       "Helen Meyer",
  title =        "Secure your {Mac}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "590--590",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897881308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Cg,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "591--592",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "593--594",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901170",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bontchev:1996:PMV,
  author =       "Vesselin Bontchev",
  title =        "Possible macro virus attacks and how to prevent them",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "595--626",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489788131X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jansen:1996:MEM,
  author =       "Cees J. A. Jansen and Piet van der Vlist",
  title =        "Message encipherment with minimal expansion and
                 redundancy-doing better than {ISO-10126}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "627--632",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yesberg:1996:QAV,
  author =       "John D. Yesberg and Mark S. Anderson",
  title =        "Quantitative authentication and vouching",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "633--645",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11rch in Computer
                 Security",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "647--649",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896901194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Pg,
  author =       "Anonymous",
  title =        "Pages 550--649 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:16 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ei,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "652--653",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897896976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:PWI,
  author =       "Harold Joseph Highland",
  title =        "Passwords, the web, and the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "654--654",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897896988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:PP,
  author =       "Harold Joseph Highland",
  title =        "Pornography and privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "654--655",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:WBN,
  author =       "Harold Joseph Highland",
  title =        "It's a web browser! {No}, it's a weapon!",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "655--656",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:IWD,
  author =       "Harold Joseph Highland",
  title =        "{Internet}\slash web directory",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "656--657",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:EW,
  author =       "Harold Joseph Highland",
  title =        "The enemy within",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "657--657",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1996:NVI,
  author =       "Harold Joseph Highland",
  title =        "Ntis volumes of interest",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "658--660",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reid:1996:PHH,
  author =       "Jim Reid",
  title =        "Plugging the holes in host-based authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "661--671",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489789699X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Adams:1996:OBS,
  author =       "Dean Adams",
  title =        "Open for business --- Securely!",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "673--682",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CBS,
  author =       "Helen Meyer",
  title =        "Corporates blas{\'e} over software theft",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "685--685",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CTN,
  author =       "Helen Meyer",
  title =        "Cybercop takes on network snoops",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "685--685",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MTS,
  author =       "Helen Meyer",
  title =        "{MOD} tooled up on security issue",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "685--686",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IMV,
  author =       "Helen Meyer",
  title =        "{InterScan E-Mail Viruswall 1.5}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "686--686",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:LMV,
  author =       "Helen Meyer",
  title =        "Laroux macro virus strain hits {Excel}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "686--686",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PRR,
  author =       "Helen Meyer",
  title =        "Police ruling reveals {CMA} weakness",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "686--686",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TFP,
  author =       "Helen Meyer",
  title =        "Telephone fraud poses threat to {UK} business",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "686--687",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DWA,
  author =       "Helen Meyer",
  title =        "Developers worried about safety of {Java} and
                 {ActiveX}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "687--687",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:OSP,
  author =       "Helen Meyer",
  title =        "Online sales pose security concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "687--687",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PP,
  author =       "Helen Meyer",
  title =        "Photon protection",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "687--687",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489789709X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TBP,
  author =       "Helen Meyer",
  title =        "Terrorism bill pits safety vs. privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "687--687",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:PIS,
  author =       "Helen Meyer",
  title =        "Privacy issues stir online passions",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "687--688",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489789712X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:DCC,
  author =       "Helen Meyer",
  title =        "Developers can control {Java} access with firewall",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "688--688",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IUS,
  author =       "Helen Meyer",
  title =        "{Internet} users sued for software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "688--688",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:TAS,
  author =       "Helen Meyer",
  title =        "Transarc addresses'net security concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "688--688",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:IFO,
  author =       "Helen Meyer",
  title =        "{Intranet} firewalls offer no protection against the
                 enemy within",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "688--689",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:CYN,
  author =       "Helen Meyer",
  title =        "Curing your {NT} security headache",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "689--689",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:FF,
  author =       "Helen Meyer",
  title =        "Firestorm over firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "689--689",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:MSE,
  author =       "Helen Meyer",
  title =        "More secure electronic payment",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "689--689",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:BWM,
  author =       "Helen Meyer",
  title =        "Beware the Word macro virus",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "689--690",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1996:SIC,
  author =       "Helen Meyer",
  title =        "Shoot-out at the {IP} corral",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "690--690",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ch,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "691--692",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:IBRh,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "693--694",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kwok:1996:SOW,
  author =       "Lam For Kwok and Dennis Longley",
  title =        "A security officer's workbench",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "695--705",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897897222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1996:SWW,
  author =       "Frederick B. Cohen",
  title =        "A secure {World-Wide-Web} daemon",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "707--724",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michels:1996:GBO,
  author =       "Markus Michels and David Naccache and Holger
                 Petersen",
  title =        "{GOST 34.10} --- a brief overview of {Russia}'s
                 {DSA}",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "725--732",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896000168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "733--735",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404896902424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1996:Ph,
  author =       "Anonymous",
  title =        "Pages 652--735 (1996)",
  journal =      j-COMPUT-SECUR,
  volume =       "15",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1996",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "2--2",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900006",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:E,
  author =       "John Meyer",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:RBBa,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "4--13",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857823",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1997:IWI,
  author =       "Gerald L. Kovacich",
  title =        "Information warfare and the information systems
                 security professional",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "14--24",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857835",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boyce:1997:CEC,
  author =       "Brian Boyce",
  title =        "Cyber extortion --- The corporate response",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "25--28",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857847",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1997:ISA,
  author =       "Fred Cohen",
  title =        "Information system attacks: a preliminary
                 classification scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "29--46",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857859",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:CLN,
  author =       "Harold Joseph Highland",
  title =        "Current literature The 19th National Information
                 Systems Security Conference",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "47--59",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857860",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:NBC,
  author =       "Anonymous",
  title =        "A new browser could let others tap into your bank
                 account: {Dan} Stets. The {Philadelphia} Inquirer,
                 {February} 16, 1997",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857896",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:WES,
  author =       "Anonymous",
  title =        "When encryption slows you down: Datamation, {January}
                 1997, p. 13, 14",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857872",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:WHA,
  author =       "Anonymous",
  title =        "{Web} hack attacks bring down servers, but businesses
                 stay: {Mitch Wavner and Kim Girard. Computerworld,
                 January 6, 1997, p. 1, 16}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857884",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CKG,
  author =       "Anonymous",
  title =        "Cryptography: a key to growth --- and crime: {Nicholas
                 Bray, Wall Street Journal Europe, January 27, 1997}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "62--62",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857914",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:HDC,
  author =       "Anonymous",
  title =        "How digital certificates work: {LAN} Times, {January}
                 6, 1997, p. 39",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "62--62",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:OSS,
  author =       "Anonymous",
  title =        "Online security is {Swiss} cheese, a survey finds:
                 {Michael Tarsala. Investor's Business Daily, January
                 20, 1997}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "62--62",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857902",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CCL,
  author =       "Anonymous",
  title =        "Cyberclash over cybercash: {Lisa Picarille.
                 Computerworld, December 9, 1996, p. 12}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "62--63",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:GCG,
  author =       "Anonymous",
  title =        "Gotcha! {Con} games on the {Internet}: {Sharon Gaudin.
                 Computerworld, February 10, 1997, pp. 43--44}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "63--63",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489785794X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:TKW,
  author =       "Anonymous",
  title =        "Tools keep {Web} surfing safe: Monica {Snell}. {LAN}
                 Times, {January} 6, 1997, p. 7, 10",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "63--63",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857951",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:SVB,
  author =       "Anonymous",
  title =        "Stop viruses before they replicate: Doug van {Kirk}.
                 {LAN} Times, {December} 9, 1996, p. 91",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "63--64",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857963",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:DYK,
  author =       "Anonymous",
  title =        "It's 1997. Do you know where your data is?: {Robert
                 Moskowitz. Network Computing, February 15, 1997, pp.
                 39--40}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "64--64",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857987",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IFP,
  author =       "Anonymous",
  title =        "Internal firewalls protect against inside jobs: {Rivka
                 Tadjer. Computing, December 1, 1996, pp. 28--30}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "64--64",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857975",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:BCA,
  author =       "Anonymous",
  title =        "Between the cracks: {Alan Earls, Computerworld,
                 February 10, 1997, pp. 79--80}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "64--65",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897857999",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:HFT,
  author =       "Anonymous",
  title =        "Holding the fort: {Thomas Parkhurst. Computerworld,
                 February 10, 1977, pp. 73--77}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "65--65",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858014",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:RSAa,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{Screening for applets}}: Sharon
                 Machlis. Computerworld, February 10, 1977, pp.
                 51--52}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "65--65",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:SPY,
  author =       "Anonymous",
  title =        "{SecureDesktop} protects your {PC} like a vault:
                 {Christopher Smith, Network Computing, February 15,
                 1997, pp. 52--54}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "65--65",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858026",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:RWS,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{Web security: how much is
                 enough?}}: Vance McCarthy. Datamation January 1997, pp.
                 112--117}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "65--66",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858038",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:RDS,
  author =       "Anonymous",
  title =        "Review: {{\booktitle{A digital signature scheme based
                 upon the theory of quadratic residues}}: C. C. Chang,
                 J.K Jan and H. C. Kowng. Cryptologia, January, 1997,
                 pp. 55--70}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "66--66",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489785804X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:FFP,
  author =       "Anonymous",
  title =        "Fortifyingyour firewall: {Peter Morrissey. Network
                 Computing, February 15, 1997, pp. 57--71}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "66--66",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858051",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:VKS,
  author =       "Anonymous",
  title =        "Virus killers: {Stan Miastkowski. PC World, March
                 1997, pp. 181--190}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "66--66",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897858063",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ca,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "67--68",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900341",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRa,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "69--70",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900365",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Soh:1997:SIP,
  author =       "B. C. Soh and T. S. Dillon",
  title =        "System intrusion processes: a simulation model",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "71--79",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "80--82",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900407",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pa,
  author =       "Anonymous",
  title =        "Pages 2--82 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ea,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "84--85",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882879",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:NSN,
  author =       "Harold Joseph Highland",
  title =        "News scan and notes \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "86--87",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882880",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:YMW,
  author =       "Harold Joseph Highland",
  title =        "You must be on the web",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "87--88",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:WNR,
  author =       "Harold Joseph Highland",
  title =        "{Windows NT} registry",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "88--90",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902236",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:SS,
  author =       "Harold Joseph Highland",
  title =        "Salvage and security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "90--91",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:NVIa,
  author =       "Harold Joseph Highland",
  title =        "{NTIS} volumes of interest",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "91--93",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489790225X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1997:ISD,
  author =       "Fred Cohen",
  title =        "Information system defences: a preliminary
                 classification scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "94--114",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882892",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bouniol:1997:PTL,
  author =       "Stephane G. Bouniol",
  title =        "The puzzle theorem --- The less {I} know, the less {I}
                 can disclose \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "115--125",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882909",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:FRT,
  author =       "Helen Meyer",
  title =        "{FAST} running out of time",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PC,
  author =       "Helen Meyer",
  title =        "Preparing for cyberwar",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "127--127",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882910",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BBR,
  author =       "Helen Meyer",
  title =        "Browser bugs raise security concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "127--128",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:MBH,
  author =       "Helen Meyer",
  title =        "Military beefing up its hackers defences",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "128--128",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882946",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:REM,
  author =       "Helen Meyer",
  title =        "Router encryption made easy --- the hard way",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "128--128",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882958",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:TMK,
  author =       "Helen Meyer",
  title =        "Trust in my key",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "128--128",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489788296X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SDI,
  author =       "Helen Meyer",
  title =        "Sign up for a Digital {ID} here!",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "128--129",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882971",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:AVS,
  author =       "Helen Meyer",
  title =        "Anti-virus software gets shot in the arm",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "129--129",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:DYK,
  author =       "Helen Meyer",
  title =        "Do you know the security code?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "129--129",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897882995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:MAC,
  author =       "Helen Meyer",
  title =        "E-mail attacks can clog systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "129--129",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PAF,
  author =       "Helen Meyer",
  title =        "Plan ahead for firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "129--130",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HFE,
  author =       "Helen Meyer",
  title =        "Hacker {FAQ} exposes attack strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "130--130",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:VSG,
  author =       "Helen Meyer",
  title =        "Virus strategies get closer look",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "130--130",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:LI,
  author =       "Helen Meyer",
  title =        "Lock {IT} up",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "130--131",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:TT,
  author =       "Helen Meyer",
  title =        "Tracking down trouble",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "131--131",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:WSS,
  author =       "Helen Meyer",
  title =        "Want security? {See} what hacker does with a cookie",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "131--131",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489788306X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SP,
  author =       "Helen Meyer",
  title =        "Save and prosper",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "131--132",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Cb,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "133--134",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902261",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "135--136",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Volpano:1997:SFT,
  author =       "Dennis Volpano and Cynthia Irvine",
  title =        "Secure flow typing",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "137--144",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tettero:1997:ISE,
  author =       "O. Tettero and D. J. Out and H. M. Franken and J.
                 Schot",
  title =        "Information security embedded in the design of
                 telematics systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "145--164",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:SIV,
  author =       "Anonymous",
  title =        "Subject index for volume 15",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "165--171",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:AIV,
  author =       "Anonymous",
  title =        "Author index for volume 15",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "172--172",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897883095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "173--175",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pb,
  author =       "Anonymous",
  title =        "Pages 84--175 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:18 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ec,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "178--179",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897844987",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:NS,
  author =       "Harold Joseph Highland",
  title =        "News scan",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "180--181",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902601",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:SC,
  author =       "Harold Joseph Highland",
  title =        "Security in computing",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "181--181",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902613",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:Y,
  author =       "Harold Joseph Highland",
  title =        "Year 2000",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "181--182",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902625",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:VSM,
  author =       "Harold Joseph Highland",
  title =        "Virus scanners for multiple {OSes}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "182--184",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902637",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:WBC,
  author =       "Harold Joseph Highland",
  title =        "Why {I} bought a {Compaq}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "184--186",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:WSD,
  author =       "Harold Joseph Highland",
  title =        "{Web} site directory",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "186--187",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902650",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CCV,
  author =       "Anonymous",
  title =        "Constructing computer virus phylogenies",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "187--187",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845087",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:PKC,
  author =       "Anonymous",
  title =        "Public-key cryptosystems based on linear codes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "187--187",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845063",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:NVIb,
  author =       "Harold Joseph Highland",
  title =        "{NTIS} volumes of interest",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "187--187",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845075",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CDP,
  author =       "Anonymous",
  title =        "Computer disasters: prevention and recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "187--188",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845099",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:DBT,
  author =       "Anonymous",
  title =        "Data backup technology",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "188--188",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845105",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Molini:1997:EBD,
  author =       "James E. Molini",
  title =        "Electronic borders: Defining and protecting national
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "189--196",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845117",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:1997:WIS,
  author =       "Thomas Finne",
  title =        "What are the information security risks in decision
                 support systems and data warehousing?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "197--204",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845129",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:ISC,
  author =       "Harold Joseph Highland",
  title =        "{IFIP\slash SEC'97} conference proceedings",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "205--205",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845130",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:FMA,
  author =       "Anonymous",
  title =        "A formal model to aid documenting and harmonizing of
                 information security requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "205--206",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845142",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CPS,
  author =       "Anonymous",
  title =        "Code of practice: a standard for information security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "206--206",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845166",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CTM,
  author =       "Anonymous",
  title =        "A compile-time model for safe information flow in
                 object-oriented databases",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "206--206",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845178",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:DAP,
  author =       "Anonymous",
  title =        "Deriving authorization from process analysis in legacy
                 information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "206--206",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845154",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CSB,
  author =       "Anonymous",
  title =        "Can security baselines replace risk analysis?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "206--207",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784518X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ADS,
  author =       "Anonymous",
  title =        "An attack detection system for secure computer
                 systems-outline of the solution",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "207--207",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845221",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CCF,
  author =       "Anonymous",
  title =        "A {\em common criteria} framework for the evaluation
                 of information technology systems security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "207--207",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784521X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:NVI,
  author =       "Anonymous",
  title =        "New vistas on info-system security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "207--207",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845208",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:PAP,
  author =       "Anonymous",
  title =        "Pseudonymous audit for privacy enhanced intrusion
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "207--207",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845191",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:SWO,
  author =       "Anonymous",
  title =        "Security when outsourcing: concepts, constructs,
                 compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "208--208",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845233",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:TEC,
  author =       "Anonymous",
  title =        "A taxonomy of electronic case schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "208--208",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845257",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:THV,
  author =       "Anonymous",
  title =        "Towards a holistic view of security and safety of
                 enterprise information and communication technologies:
                 adapting to a changing paradigm",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "208--208",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845245",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:SRS,
  author =       "Anonymous",
  title =        "Security requirements and solution in distributed
                 electronic health records",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "208--209",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845269",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CNK,
  author =       "Anonymous",
  title =        "A comprehensive need-to-know access control system and
                 its application for medical information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "209--209",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845294",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:FNN,
  author =       "Anonymous",
  title =        "The future of networks and network security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "209--209",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845270",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:NIA,
  author =       "Anonymous",
  title =        "Non-intrusive authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "209--209",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845282",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:RSAb,
  author =       "Anonymous",
  title =        "Roaming security agents enabling intelligent access
                 control and network protection",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "209--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845300",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CIA,
  author =       "Anonymous",
  title =        "Controlling {Internet} access at an educational
                 institution",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "210--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845324",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CSC,
  author =       "Anonymous",
  title =        "A comparison of schemes for certification
                 authorities\slash trusted third parties",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "210--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845312",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:HTS,
  author =       "Anonymous",
  title =        "How to trust systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "210--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845348",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IIS,
  author =       "Anonymous",
  title =        "Integrating information security in the development of
                 telematic systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "210--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845336",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:NOF,
  author =       "Anonymous",
  title =        "New organizational forms for information security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "210--210",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784535X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:ITNa,
  author =       "Dr. Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "211--212",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902662",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CF,
  author =       "Helen Meyer",
  title =        "Confessing to the {FBI}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "213--213",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845385",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:ITP,
  author =       "Helen Meyer",
  title =        "Identity thieves place credit ratings at risk",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "213--213",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845397",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HHA,
  author =       "Helen Meyer",
  title =        "Hackers hit {AOL} cybervirgins",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "213--214",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845403",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HBC,
  author =       "Helen Meyer",
  title =        "{Hacker}'s brother changes his grades",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "214--214",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845440",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:LUE,
  author =       "Helen Meyer",
  title =        "Labour to unlock encryption plans",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "214--214",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845415",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PFS,
  author =       "Helen Meyer",
  title =        "Part of the foundation for secure systems: separation
                 of duties policy",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "214--214",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845427",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:STS,
  author =       "Helen Meyer",
  title =        "{Singapore} tops software piracy list, survey shows",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "214--214",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845439",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:DSI,
  author =       "Helen Meyer",
  title =        "Driving safely on the information highway",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "214--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845452",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:IML,
  author =       "Helen Meyer",
  title =        "{Internet} E-mail looks for security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845476",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:MES,
  author =       "Helen Meyer",
  title =        "{Microsoft} establishes security zones",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845464",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PFG,
  author =       "Helen Meyer",
  title =        "{PGP} is first to gain crypto approval",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845488",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:WDY,
  author =       "Helen Meyer",
  title =        "Whom do you trust?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784549X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:WTW,
  author =       "Helen Meyer",
  title =        "Walking through the wall of fire",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "215--215",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845506",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:A,
  author =       "Helen Meyer",
  title =        "Analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "216--216",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845518",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:FRS,
  author =       "Helen Meyer",
  title =        "Five rules for selling security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "216--216",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784552X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BFN,
  author =       "Helen Meyer",
  title =        "Banks fear net losses",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "216--217",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845531",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:IES,
  author =       "Helen Meyer",
  title =        "{Internet} Explorer security flaws",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845555",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SCN,
  author =       "Helen Meyer",
  title =        "Secure communications now or later?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845567",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:TNS,
  author =       "Helen Meyer",
  title =        "Tackling network security can be an uphill battle",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "217--217",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845543",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SV,
  author =       "Helen Meyer",
  title =        "Secure {VPNs}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "217--218",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845579",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:IAa,
  author =       "Helen Meyer",
  title =        "Intruder alert",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "218--218",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897845580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Cc,
  author =       "Anonymous",
  title =        "Calender",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "219--220",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "221--222",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ciechanowicz:1997:RAR,
  author =       "Zbigniew Ciechanowicz",
  title =        "Risk analysis: requirements, conflicts and problems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "223--232",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krsul:1997:AAI,
  author =       "Ivan Krsul and Eugene H. Spafford",
  title =        "Authorship analysis: identifying the author of a
                 program",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "233--257",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "259--261",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pc,
  author =       "Anonymous",
  title =        "Pages 178--261 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ed,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "264--265",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801885",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:RBBb,
  author =       "Harold Joseph Highland",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "266--275",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801897",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHa,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone? {A} study in
                 motivation, deterrence, and crime displacement: Part 1
                 --- introduction and methodology",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "277--284",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHb,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone?: Part 2 --- Frequency
                 of computer related abuse: the surveys, and public
                 perception of the problem",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "285--290",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHc,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone?: Part 3 ---
                 Motivation and deterrence",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "291--297",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHd,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone?: Part 4 ---
                 Legislation",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "298--303",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801939",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHe,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone?: Part 5 ---
                 Conclusions",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "304--306",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801940",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:WAHf,
  author =       "Tom Mulhall",
  title =        "Where have all the hackers gone?: Part 6 ---
                 Appendices and bibliography",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "307--315",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489790153X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1997:MVI,
  author =       "Charles Cresson Wood",
  title =        "A management view of {Internet} electronic commerce
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "316--320",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801952",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1997:IMU,
  author =       "Gerald Kovacich",
  title =        "The {ISSO} must understand the business and management
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "321--326",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801964",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:ITNb,
  author =       "Harold Joseph Highland",
  title =        "{IFIP TC 11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "327--328",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901553",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NEC,
  author =       "Helen Meyer",
  title =        "A new era in cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NPC,
  author =       "Helen Meyer",
  title =        "No peeking: can web users thwart snoops?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897801976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NAE,
  author =       "Helen Meyer",
  title =        "New age of encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "329--330",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780199X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CK,
  author =       "Helen Meyer",
  title =        "Crypt keeper",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:FSS,
  author =       "Helen Meyer",
  title =        "Four steps to security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802015",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:TMS,
  author =       "Helen Meyer",
  title =        "{TIS}, {Microsoft} security initiative",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:LPW,
  author =       "Helen Meyer",
  title =        "Legal peril on the web",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "330--331",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HFT,
  author =       "Helen Meyer",
  title =        "A history of firewall technology",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "331--331",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SMS,
  author =       "Helen Meyer",
  title =        "Scrambling e-mail on a server",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "331--331",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:IAb,
  author =       "Helen Meyer",
  title =        "{Internet} armour",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "331--332",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:AD,
  author =       "Helen Meyer",
  title =        "Averting disaster",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "332--332",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:WTM,
  author =       "Helen Meyer",
  title =        "Watch out for the threat of e-mail viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "332--332",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BW,
  author =       "Helen Meyer",
  title =        "Bugs in the web",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "332--333",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780209X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CSB,
  author =       "Helen Meyer",
  title =        "Certificates still being tuned",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "333--333",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CYC,
  author =       "Helen Meyer",
  title =        "Cleansing your computer's palate",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "333--333",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BMA,
  author =       "Helen Meyer",
  title =        "The big macro attack",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "334--334",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780212X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SID,
  author =       "Helen Meyer",
  title =        "Securing intranet data with {SSL} client
                 certificates",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "334--334",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "335--336",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRd,
  author =       "Anonymous",
  title =        "International Board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "337--338",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chih-Hung:1997:MCH,
  author =       "Wang Chih-Hung and Hwang Tzonelih",
  title =        "Modified {Chen-Hwang} identity-based conference key
                 broadcast schemes with user authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "339--344",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "345--347",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901619",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pd,
  author =       "Anonymous",
  title =        "Pages 264--347 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PHJ,
  author =       "John Meyer",
  title =        "{Professor Harold Joseph Highland FICS, FACM}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "350--355",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822407",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:RBB,
  author =       "Anonymous",
  title =        "Random bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "356--364",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822419",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:TW,
  author =       "Harold Joseph Highland",
  title =        "The threats on the web",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "365--368",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822420",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:DEN,
  author =       "Harold Joseph Highland",
  title =        "Data encryption: a non-mathematical approach",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "369--386",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822432",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:HBB,
  author =       "Harold Joseph Highland",
  title =        "Historical bits and bytes",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "387--411",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822444",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:HCVa,
  author =       "Harold Joseph Highland",
  title =        "A history of computer viruses --- Introduction",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "412--415",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822456",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:HCVb,
  author =       "Harold Joseph Highland",
  title =        "A history of computer viruses --- The famous `trio'",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "416--429",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822468",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:HCVc,
  author =       "Harold Joseph Highland",
  title =        "A history of computer viruses: Three special viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "430--438",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489782247X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Highland:1997:PRC,
  author =       "Harold Joseph Highland",
  title =        "Procedures to reduce the computer virus threat",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "439--449",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897822481",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pe,
  author =       "Anonymous",
  title =        "Pages 350--449 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ee,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "452--453",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1997:ICD,
  author =       "Dr. Gerald Kovacich",
  title =        "{ISSO} career development",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "455--458, 461--462, 464--468",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846408",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:1997:ISI,
  author =       "Thomas Finne",
  title =        "Information security implemented in: the theory on
                 stock market efficiency, {Markowitz}'s portfolio theory
                 and porter's value chain",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "469--479",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784641X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gennaro:1997:TPC,
  author =       "Rosario Gennaro and Paul Karger and Stephen Matyas and
                 Mohammad Peyravian Allen Roginsky and David Safford and
                 Michael Willett and Nev Zunic",
  title =        "Two-phase cryptographic key recovery system",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "481--506",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(97)84642-1",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846421",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NHW,
  author =       "Helen Meyer",
  title =        "{NT} hackers warn of easy password interception",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "507--507",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846433",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NGM,
  author =       "Helen Meyer",
  title =        "{Novell} gets \$4 million in first fraud upgrade
                 trial",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "507--508",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846445",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HBN,
  author =       "Helen Meyer",
  title =        "Hackers blackmail Net businesses",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "508--508",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:MET,
  author =       "Helen Meyer",
  title =        "{MITI} encryption-technology policy criticized",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "508--508",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846469",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SCD,
  author =       "Helen Meyer",
  title =        "Shielding company data from internal threats",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "508--508",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HCB,
  author =       "Helen Meyer",
  title =        "{House} committee backs {Clinton} on encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "508--509",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846482",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:FNC,
  author =       "Helen Meyer",
  title =        "Future of Net cracked, flawed",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "509--509",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846494",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HTC,
  author =       "Helen Meyer",
  title =        "Hacker tools can give {IS} a boost",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "509--509",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846500",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SSC,
  author =       "Helen Meyer",
  title =        "E-signatures for the security conscious",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "509--510",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846512",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:HC,
  author =       "Helen Meyer",
  title =        "Handle with care",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "510--510",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846524",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SAE,
  author =       "Helen Meyer",
  title =        "Software {AG} extends mainframe security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "510--510",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846536",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:YWS,
  author =       "Helen Meyer",
  title =        "Is your {Web} site secure?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "510--510",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846548",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PPS,
  author =       "Helen Meyer",
  title =        "Pact promises simplified security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "510--511",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784655X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CDB,
  author =       "Helen Meyer",
  title =        "Computer doctor busy fighting `viruses'",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "511--511",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846573",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:CKK,
  author =       "Helen Meyer",
  title =        "The cherished keys to the kingdom",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "511--511",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846561",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:TSI,
  author =       "Helen Meyer",
  title =        "Telecoms systems insecurity, exploitation, fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "511--512",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846585",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BBB,
  author =       "Helen Meyer",
  title =        "Bridging the business-to-business authentication gap",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "512--512",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846597",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:LF,
  author =       "Helen Meyer",
  title =        "In the line of fire",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "512--512",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846603",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "513--514",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489790273X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1997:IFA,
  author =       "Donn B. Parker",
  title =        "{Infosec} folk art and beyond",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846615",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:1997:SOV,
  author =       "Eugene Spafford",
  title =        "Some observations on vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846627",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1997:IMS,
  author =       "Peter Wood",
  title =        "{Internet} E-mail security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "515--515",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846639",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amery:1997:LBW,
  author =       "Chris Amery",
  title =        "Look back in wonder",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846676",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bacon:1997:EE,
  author =       "Michael Bacon",
  title =        "The enemy everywhere",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846652",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1997:IDR,
  author =       "Fred Cohen",
  title =        "Intrusion detection and response",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784669X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hickson:1997:EPUa,
  author =       "Nigel Hickson",
  title =        "Encryption policy --- a {UK} perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846640",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nacht:1997:SMF,
  author =       "Marius Nacht",
  title =        "The spectrum of modern firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846664",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1997:WCA,
  author =       "Tom Parker",
  title =        "What are certification authorities and what are they
                 liable for?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846688",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aubrey-Jones:1997:CMV,
  author =       "David Aubrey-Jones",
  title =        "Contracting a macro virus whilst surfing the
                 {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846743",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Docherty:1997:IE,
  author =       "Paul Docherty",
  title =        "{Internet} encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846731",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:UTO,
  author =       "Carl Meyer",
  title =        "Update on triple {DES} operations and crypto system
                 initialization",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846706",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:YHI,
  author =       "Carl Meyer",
  title =        "20 years of {DES} --- How it was designed",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784672X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Osborne:1997:AAS,
  author =       "Keith Osborne",
  title =        "Advanced auditing: Selecting and testing the right
                 controls",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846718",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pool:1997:CAG,
  author =       "Vernon Pool",
  title =        "{COBIT} --- Audit guidance on effective
                 implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "518, 521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846755",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Birch:1997:WNS,
  author =       "Peter Birch",
  title =        "{Windows NT} security today and the future",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846809",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoath:1997:TFG,
  author =       "Peter Hoath",
  title =        "Telecommunications fraud, the gory details",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846780",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lindup:1997:USP,
  author =       "Ken Lindup",
  title =        "Update on the state of play in the hacker community",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846779",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:CRF,
  author =       "Tom Mulhall",
  title =        "Computer-related fraud and its evolution within
                 telephony",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846767",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulhall:1997:PFF,
  author =       "Tom Mulhall and Peter Hoath",
  title =        "{PBX} fraud, the final solution --- Detection,
                 deterrent, countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846792",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:1997:SWN,
  author =       "Eugene Schultz",
  title =        "Securing {Windows NT} in today's network environment",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "521--522",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846810",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shehu:1997:US,
  author =       "Suleiman Shehu",
  title =        "{Unix} security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846822",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1997:PAD,
  author =       "Charles Cresson Wood",
  title =        "Policies alone do not constitute a sufficient
                 awareness effort",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846834",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pepper:1997:AYI,
  author =       "Bill Pepper",
  title =        "Addressing your information security skills
                 shortages",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "522--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846846",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bacon:1997:BGY,
  author =       "Michael Bacon",
  title =        "Bang goes your business",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846883",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dosdale:1997:ECW,
  author =       "Terry Dosdale",
  title =        "Electronic commerce --- The way forward",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489784686X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parkin:1997:IIS,
  author =       "Roderick Parkin",
  title =        "The importance of {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846895",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:1997:MSOa,
  author =       "John Sherwood",
  title =        "Managing security for outsourcing contracts",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846858",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wilson:1997:CSC,
  author =       "Heather Wilson",
  title =        "Creating a security culture",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846871",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1997:NSS,
  author =       "Peter Wood",
  title =        "{NT} server security, audit and control",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "523--524",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846901",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crocker:1997:KCR,
  author =       "Norman Crocker",
  title =        "Key concerns in a review of {CAACF2\slash MVS}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846925",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hardy:1997:PT,
  author =       "Gary Hardy",
  title =        "Penetration testing",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846913",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Osborne:1997:AIS,
  author =       "Keith Osborne",
  title =        "Auditing the {IT} security function",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846937",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:1997:STP,
  author =       "Eugene Schultz",
  title =        "Securing third party connections",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "524--525",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846949",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Corcoran:1997:IWD,
  author =       "Michael J. Corcoran",
  title =        "Information warfare and defending the {UK} nation
                 state",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "525--525",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846950",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1997:IFW,
  author =       "Sarah Gordon",
  title =        "Information flow within the globally connected
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "525--525",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846974",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1997:SVIa,
  author =       "Donn B. Parker",
  title =        "The strategic value of information in business",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "525--525",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846986",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wood:1997:ECI,
  author =       "Charles Cresson Wood",
  title =        "Essential controls for {Internet} electronic
                 commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "525--525",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846962",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1997:PTSa,
  author =       "Andy Jones",
  title =        "Penetration testing and system audit --- Experience
                 gained and lessons learned during the investigation of
                 systems within the {United Kingdom}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "525--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897846998",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bailey:1997:IAN,
  author =       "Steve Bailey",
  title =        "Intelligent agents: New security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "526--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847001",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crichard:1997:ILQ,
  author =       "Mark Crichard",
  title =        "The {Internet} --- a legal quagmire",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "526--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hopwood:1997:CBJ,
  author =       "David Hopwood",
  title =        "A comparison between {Java} and {activeX} security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "526--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Joachim:1997:YP,
  author =       "Margaret Joachim",
  title =        "The year 2000 problem",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "526--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Laird:1997:SBG,
  author =       "Alan Laird",
  title =        "{Smartcards} --- Is {Britain} getting smarter?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "526--526",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kemp:1997:ESOa,
  author =       "Alasdair Kemp",
  title =        "Embedded systems: the other problem",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "527--527",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:1997:BV,
  author =       "Eugene Spafford",
  title =        "Blaming the victim",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "527--527",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897847062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:CEa,
  author =       "Anonymous",
  title =        "{Compsec '97} exhibitors",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "529--532, 534, 536, 537--540",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902741",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRe,
  author =       "Anonymous",
  title =        "International Board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "541--542",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902753",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Labuschagne:1997:ISA,
  author =       "L. Labuschagne and J. H. P. Eloff",
  title =        "Improved system-access control using complementary
                 technologies",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "543--549",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Foley:1997:BCW,
  author =       "Simon N. Foley",
  title =        "Building {Chinese} walls in standard {Unix$^{TM}$}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "551--563",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "565--567",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897902765",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pf,
  author =       "Anonymous",
  title =        "Pages 452--567 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ef,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "570--571",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807924",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parker:1997:SVIb,
  author =       "Donn B. Parker",
  title =        "The strategic values of information security in
                 business",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "572--582",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807936",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hickson:1997:EPUb,
  author =       "Nigel Hickson",
  title =        "Encryption policy --- a {UK} perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "583--589",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807948",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1997:FST,
  author =       "Chris Pounder",
  title =        "First steps towards a {European Union} policy on the
                 securing of electronic communications",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "590--594",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780795X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jones:1997:PTSb,
  author =       "Andy Jones",
  title =        "Penetration testing and system audit --- experience
                 gained during the investigation of systems within the
                 {UK}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "595--602",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807961",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sherwood:1997:MSOb,
  author =       "John Sherwood",
  title =        "Managing security for outsourcing contracts",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "603--609",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807973",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1997:ISS,
  author =       "Gerald Kovacich",
  title =        "Information systems security metrics management",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "610--618",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807985",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:BCN,
  author =       "Helen Meyer",
  title =        "Backdoor closes, for now, on crypto plan",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "619--619",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897807997",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SYU,
  author =       "Helen Meyer",
  title =        "Securing your users' {Web} browsers",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "619--619",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808000",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NTS,
  author =       "Helen Meyer",
  title =        "New twists on secure {VPNS}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "619--620",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:IUS,
  author =       "Helen Meyer",
  title =        "{ISS} unveils 4-step security program",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "620--620",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PBT,
  author =       "Helen Meyer",
  title =        "Privacy better than `Pretty Good'",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "620--620",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:WSC,
  author =       "Helen Meyer",
  title =        "{WorldSecure} Server combats E-mail plagues",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "620--620",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:PPB,
  author =       "Helen Meyer",
  title =        "{PKI} provides a base for secure transactions",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "620--621",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780805X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:LOC,
  author =       "Helen Meyer",
  title =        "Low-overhead cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "621--621",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SCS,
  author =       "Helen Meyer",
  title =        "Software could spoof-proof domain names",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "621--621",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:UAV,
  author =       "Helen Meyer",
  title =        "User authentication, {VPN} in an appliance",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "621--621",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SMW,
  author =       "Helen Meyer",
  title =        "Self-mutating Word viruses create strain",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "621--622",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:DNI,
  author =       "Helen Meyer",
  title =        "Detecting network intruders",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "622--622",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:NNW,
  author =       "Helen Meyer",
  title =        "A new and nasty way to flood networks with spam",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "622--623",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:MYL,
  author =       "Helen Meyer",
  title =        "Monitoring as you like it",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "623--623",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SSD,
  author =       "Helen Meyer",
  title =        "Servers to spam: drop dead",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "623--623",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808139",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SWA,
  author =       "Helen Meyer",
  title =        "{Smartcards}: world access",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "623--623",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808127",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:SEM,
  author =       "Helen Meyer",
  title =        "Secure electronic-mail: return to sender",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "624--624",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808176",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:UVP,
  author =       "Helen Meyer",
  title =        "Unlocking virtual private networks",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "624--624",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808164",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1997:VSU,
  author =       "Helen Meyer",
  title =        "{VPNS}: security with an uncommon touch",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "624--624",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897808152",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "625--626",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901620",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "627--628",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901632",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bunnell:1997:CAC,
  author =       "Julie Bunnell and John Podd and Ron Henderson and
                 Renee Napier and James Kennedy-Moffat",
  title =        "Cognitive, associative and conventional passwords:
                 Recall and guessing rates",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "629--641",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCf,
  author =       "Anonymous",
  title =        "{IFip} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "643--645",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897901644",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Pg,
  author =       "Anonymous",
  title =        "Pages 570--645 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Eg,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "648--649",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875773",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ratnasingham:1997:ESR,
  author =       "Pauline Ratnasingham",
  title =        "{EDI} security --- re-evaluation of controls and its
                 implications on the organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "650--656",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875785",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1997:HMY,
  author =       "Gerald Kovacich",
  title =        "How to market yourself as an {ISSO}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "657--662",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875797",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kemp:1997:ESOb,
  author =       "Alasdair Kemp",
  title =        "Embedded systems: the other problem",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "663--668",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875803",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Clark:1997:KRW,
  author =       "Andrew J. Clark",
  title =        "Key recovery --- why, how, who?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "669--674",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875815",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:CEI,
  author =       "Ben McClure",
  title =        "Concerns ease over {Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "675--675",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875840",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:FHT,
  author =       "Ben McClure",
  title =        "Former high-tech thief warns of scams",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "675--675",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875839",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:MAB,
  author =       "Ben McClure",
  title =        "Man accused of being {UK}'s first {Internet} pirate",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "675--675",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875827",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:ABM,
  author =       "Ben McClure",
  title =        "Area banks mount elaborate electronic defences",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "676--676",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875864",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:ED,
  author =       "Ben McClure",
  title =        "Exorcising demons",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "676--676",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875852",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:MBR,
  author =       "Ben McClure",
  title =        "{Microsoft} battles with {Russian} pirates",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "676--676",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875876",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:ST,
  author =       "Ben McClure",
  title =        "Stop, thief!",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "676--676",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875888",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:FCV,
  author =       "Ben McClure",
  title =        "Fighting computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "676--677",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489787589X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:IRS,
  author =       "Ben McClure",
  title =        "{Internet Rx}: Should {I} be checking downloaded
                 {Java} applets for viruses or other potential security
                 violations?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "677--677",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489787592X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:PP,
  author =       "Ben McClure",
  title =        "Portable protection",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "677--677",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875931",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:PPP,
  author =       "Ben McClure",
  title =        "Paring password pileup",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "677--677",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875918",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:SOP,
  author =       "Ben McClure",
  title =        "Should only the paranoid get E-mail protection?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "677--677",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875906",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:ANS,
  author =       "Ben McClure",
  title =        "That ain't no standard spec",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "678--678",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875967",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:DMB,
  author =       "Ben McClure",
  title =        "{Dutch} move to block {French} crypto laws",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "678--678",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875979",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:EHT,
  author =       "Ben McClure",
  title =        "Encryption: hot topic on the {Hill}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "678--678",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875955",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:WCI,
  author =       "Ben McClure",
  title =        "Wireless crime's inside story",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "678--678",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875943",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:SEM,
  author =       "Ben McClure",
  title =        "Secure electronic-mail: return to sender",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "678--679",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875980",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:BI,
  author =       "Ben McClure",
  title =        "Bulletproof {IP}",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "679--679",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:HTC,
  author =       "Ben McClure",
  title =        "High-tech crime's hidden face",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "679--679",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897875992",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:WGT,
  author =       "Ben McClure",
  title =        "Who goes there?",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "679--679",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876006",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:OLT,
  author =       "Ben McClure",
  title =        "{OECD} leader targets {Internet} security accords",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "679--680",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489787602X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:CBL,
  author =       "Ben McClure",
  title =        "Code breakers lured for crypto challenge",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "680--680",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:SGE,
  author =       "Ben McClure",
  title =        "Security gets easier, cheaper",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "680--680",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:TT,
  author =       "Ben McClure",
  title =        "Trials and tribulations",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "680--680",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1997:NSS,
  author =       "Ben McClure",
  title =        "Network security: safety is next",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "680--681",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "683--684",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900596",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:IBRg,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "685--686",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900614",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinke:1997:PDI,
  author =       "Thomas H. Hinke and Harry S. Delugach and Randall P.
                 Wolf",
  title =        "Protecting databases from inference attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "687--708",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897876079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:1997:BSP,
  author =       "Dimitris Gritzalis",
  title =        "A baseline security policy for distributed healthcare
                 information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "709--719",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897000096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "721--723",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897900638",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1997:Ph,
  author =       "Anonymous",
  title =        "Pages 648--723 (1997)",
  journal =      j-COMPUT-SECUR,
  volume =       "16",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1997",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "2--2",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903625",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Ea,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "2--4",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:SGP,
  author =       "Bill Hancock",
  title =        "Security goes prime-time",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "5--13",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ozier:1998:GPO,
  author =       "Will Ozier",
  title =        "{GSSP} preface\slash overview",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "14--18",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780243X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:HTS,
  author =       "August Bequai",
  title =        "High-tech security and the failings of {President
                 Clinton}'s {Commission on Critical Infrastructure
                 Protection}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "19--21",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:SPM,
  author =       "August Bequai",
  title =        "Software pirating and management's quagmire",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "22--26",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1998:HNL,
  author =       "Chris Pounder",
  title =        "Homeworking: No longer an easy option?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "27--30",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:HWI,
  author =       "Stephen Hinde",
  title =        "Hot water, icebergs and other disasters",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "31--33",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Osborne:1998:AIS,
  author =       "Keith Osborne",
  title =        "Auditing the {IT} security function",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "34--41",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crocker:1998:KCR,
  author =       "Norman Crocker",
  title =        "Key concerns in a review of {CA-ACF2\slash MVS}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "42--53",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nacht:1998:SMF,
  author =       "Marius Nacht",
  title =        "The spectrum of modern firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "54--56",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:DSS,
  author =       "Helen Meyer",
  title =        "Digital signatures shouldn't enter the encryption
                 debate",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "57--57",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:EUA,
  author =       "Helen Meyer",
  title =        "{eSafe} ups ante for {Java}, security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "57--57",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SCC,
  author =       "Helen Meyer",
  title =        "Security consolidations consumer-friendly",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "57--57",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LTP,
  author =       "Helen Meyer",
  title =        "Land and teardrop protection",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "57--58",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:ASV,
  author =       "Helen Meyer",
  title =        "Aventail secures {VPNs} down to the client",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "58--58",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802581",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:ISW,
  author =       "Helen Meyer",
  title =        "Ironing out {SET}'s wrinkles",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "58--58",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780257X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:IUW,
  author =       "Helen Meyer",
  title =        "{IBM} ups {Web} hosting security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "58--58",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802556",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NSI,
  author =       "Helen Meyer",
  title =        "Network security interest on rebound",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "58--58",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SCSa,
  author =       "Helen Meyer",
  title =        "{Sun} changes security framework for {Java}
                 development kit",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "58--59",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HNW,
  author =       "Helen Meyer",
  title =        "Hacker nabbed for web antics",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "59--59",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780260X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:JAT,
  author =       "Helen Meyer",
  title =        "{Java} authentication token",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "59--59",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NVT,
  author =       "Helen Meyer",
  title =        "A new virus threat?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "59--59",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WPD,
  author =       "Helen Meyer",
  title =        "White pages for digital certificates",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "59--59",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802635",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:AVB,
  author =       "Helen Meyer",
  title =        "Anti-virus belongs under the rug",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "59--60",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NND,
  author =       "Helen Meyer",
  title =        "Networks need defence against hacker attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "60--60",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:VPA,
  author =       "Helen Meyer",
  title =        "Virus protect aims high, falls short",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "60--60",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WWY,
  author =       "Helen Meyer",
  title =        "Watching what you watch",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "60--61",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:DYN,
  author =       "Helen Meyer",
  title =        "Do you need an intranet firewall?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802696",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:MGS,
  author =       "Helen Meyer",
  title =        "E-mail getting a scan from server",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802702",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SAN,
  author =       "Helen Meyer",
  title =        "Secret agents need not apply",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "61--61",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802684",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:PLW,
  author =       "Helen Meyer",
  title =        "Psst \ldots{} wanna buy some data?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "61--62",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802714",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:BI,
  author =       "Helen Meyer",
  title =        "Bulletproof {IP}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "62--62",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802726",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:MDK,
  author =       "Helen Meyer",
  title =        "Managing digital keys",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "62--62",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802738",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:UVP,
  author =       "Helen Meyer",
  title =        "Unlocking virtual private networks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "62--63",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489780274X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "65--66",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903637",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "67--68",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bontchev:1998:MVI,
  author =       "Vesselin Bontchev",
  title =        "Macro virus identification problems",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "69--89",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897802751",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "91--93",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903650",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pa,
  author =       "Anonymous",
  title =        "Pages 2--93 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Eb,
  author =       "Bill Hancock",
  title =        "From the {Editor}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "96--97",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819761",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:WDY,
  author =       "Bill Hancock",
  title =        "Who do you call for, {CISSP}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "99--109",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819773",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ford:1998:WLD,
  author =       "Richard Ford",
  title =        "What a little definition can do \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "110--114",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819785",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:CWO,
  author =       "Stephen Hinde",
  title =        "Cyber Wars and other threats",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "115--118",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819797",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lau:1998:TCS,
  author =       "Oliver Lau",
  title =        "The ten commandments of security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "119--123",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819803",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1998:SND,
  author =       "Chris Pounder",
  title =        "Security and the new Data Protection law",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "124--128",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819815",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1998:EIB,
  author =       "Gerald Kovacich",
  title =        "Electronic-{Internet} business and security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "129--135",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819827",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moulton:1998:RCC,
  author =       "Mark Moulton",
  title =        "Reducing charges of E-comm harassment",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "137--142",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819839",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lichtenstein:1998:IRC,
  author =       "Sharman Lichtenstein",
  title =        "{Internet} risks for companies",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "143--150",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819840",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITN,
  author =       "Anonymous",
  title =        "{IFIP TC11} news",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "151--152",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890267X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AUF,
  author =       "Ben McClure",
  title =        "{AOL} users fall prey to hackers' dirty tricks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819864",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SC,
  author =       "Ben McClure",
  title =        "Security and culture",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819852",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SGM,
  author =       "Ben McClure",
  title =        "Security giant moves to plug leaks in {PC} safety",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819876",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RFF,
  author =       "Ben McClure",
  title =        "Report faults {FAA} on Year 2000 hiccup",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "153--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819888",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:FFD,
  author =       "Ben McClure",
  title =        "Firms to be forced to disclose year 2000 risks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819918",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ICS,
  author =       "Ben McClure",
  title =        "Immigration computer system less than secure",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819931",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:IVP,
  author =       "Ben McClure",
  title =        "{Internet} vandals pose threat by using new attack
                 mode called `smurfing'",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489781989X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RHE,
  author =       "Ben McClure",
  title =        "{Russian} hacker enters fraud plea in {Citicorp}
                 case",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489781992X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ULB,
  author =       "Ben McClure",
  title =        "{US} losing battle on control of data encryption,
                 study says",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819906",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:PSH,
  author =       "Ben McClure",
  title =        "Plugging security holes",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "154--155",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819943",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:NSC,
  author =       "Ben McClure",
  title =        "No {SET} commitment, yet",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "155--155",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819955",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:OSL,
  author =       "Ben McClure",
  title =        "Online security leak",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "155--155",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819979",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SAI,
  author =       "Ben McClure",
  title =        "A security architecture for the {Internet} Protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "155--155",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819980",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SSA,
  author =       "Ben McClure",
  title =        "Study: security audits often neglected by many",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "155--155",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819967",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ISB,
  author =       "Ben McClure",
  title =        "{Internet} security on a budget",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "155--156",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897819992",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:BSI,
  author =       "Ben McClure",
  title =        "Banking on a secure {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "156--156",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:NAP,
  author =       "Ben McClure",
  title =        "New antivirus packages get serious",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "156--156",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:TN,
  author =       "Ben McClure",
  title =        "Target: {NT}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "156--156",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820007",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:URN,
  author =       "Ben McClure",
  title =        "{US} rethinks Net security plans after hijack plot",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "156--157",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CSP,
  author =       "Ben McClure",
  title =        "Can security pierce the electronic veil?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "157--157",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:LAC,
  author =       "Ben McClure",
  title =        "Labour acts to clean up digital certificate mess",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "157--157",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RST,
  author =       "Ben McClure",
  title =        "{Reuters} subsidiary target of {US} inquiry into theft
                 of data from {Bloomberg}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "157--157",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:WS,
  author =       "Ben McClure",
  title =        "Weak {SNMP}?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "157--157",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489782007X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ATF,
  author =       "Ben McClure",
  title =        "Airports told of flaw in security system",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "158--158",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489782010X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CIW,
  author =       "Ben McClure",
  title =        "{Cyber-IDs} will soon be at your fingertips",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "158--158",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:JKG,
  author =       "Ben McClure",
  title =        "{Java} kit gets better security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "158--158",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820081",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:MMS,
  author =       "Ben McClure",
  title =        "{MasterCard} makes {SET} more attractive",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "158--158",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RSC,
  author =       "Ben McClure",
  title =        "{Reno} to set up center to thwart `cyber-attackers'",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "158--159",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SN,
  author =       "Ben McClure",
  title =        "Safety in numbers?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "159--159",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "160--161",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902693",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:AIV,
  author =       "Anonymous",
  title =        "Author index for volume 16",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "162--162",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820147",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:SIV,
  author =       "Anonymous",
  title =        "Subject index for volume 16",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "163--168",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "169--170",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902711",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:1998:PHV,
  author =       "Mohammad Peyravian and Allen Roginsky and Ajay
                 Kshemkalyani",
  title =        "On probabilities of hash value matches",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "171--176",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404897820160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dawson:1998:MME,
  author =       "E. P. Dawson and H. M. Gustafson",
  title =        "A Method for Measuring Entropy of Symmetric Cipher Key
                 Generators",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "177--184",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489800011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "185--187",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902735",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pb,
  author =       "Anonymous",
  title =        "Pages 96--187 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Ec,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "190--191",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:SVa,
  author =       "Bill Hancock",
  title =        "Security Views",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "192--200",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880309X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maddison:1998:YEB,
  author =       "Nicky Maddison",
  title =        "Y2000 enters the body politic",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "201--206",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:RSS,
  author =       "Stephen Hinde",
  title =        "Recent security surveys",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "207--210",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1998:CEM,
  author =       "Fred Cohen and Cynthia Phillips and Laura Painton
                 Swiler and Timothy Gaylor and Patricia Leary and Fran
                 Rupley and Richard Isler",
  title =        "A cause and effect model of attacks on information
                 systems: Some Analysis Based on That Model, and The
                 Application of that Model for {CyberWarfare} in {CID}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "211--221",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880312X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CWY,
  author =       "Ben McClure",
  title =        "Be careful what you say on {Y2K}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "222--222",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:UTN,
  author =       "Ben McClure",
  title =        "U-turn on net trade security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "222--222",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:FSL,
  author =       "Ben McClure",
  title =        "{Finjan SurfinGate}: the lifeguard is on duty",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "222--223",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:KFT,
  author =       "Ben McClure",
  title =        "Kicking firewall tires",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "223--223",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:MKE,
  author =       "Ben McClure",
  title =        "Managers keep an eye on security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "223--223",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:PG,
  author =       "Ben McClure",
  title =        "{PGP} grows up",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "223--223",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:FCH,
  author =       "Ben McClure",
  title =        "Forensic computing helps firms track high-tech fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "223--224",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AMW,
  author =       "Ben McClure",
  title =        "Airtight E-mail is on the way",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "224--224",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SS,
  author =       "Ben McClure",
  title =        "Security services",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "224--224",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:WNC,
  author =       "Ben McClure",
  title =        "{Windows NT} casts a shaky {Web}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "224--224",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:BYF,
  author =       "Ben McClure",
  title =        "Burned by your firewall?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "224--225",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803234",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:MHR,
  author =       "Ben McClure",
  title =        "Major hacks raise hackles, spur defenders",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:PMC,
  author =       "Ben McClure",
  title =        "{PC} manager at center of \$2m grocery scam",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803258",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SPL,
  author =       "Ben McClure",
  title =        "Signs point to looser encryption rules",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880326X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SPS,
  author =       "Ben McClure",
  title =        "{Senate} probes State Department security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "225--225",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ICI,
  author =       "Ben McClure",
  title =        "{IPSec} for communities of interest",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "225--226",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CYA,
  author =       "Ben McClure",
  title =        "Covering your assets, electronically",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "226--226",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RM,
  author =       "Ben McClure",
  title =        "The revenue men",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "226--226",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SCH,
  author =       "Ben McClure",
  title =        "Security companies hype up {Java} risks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "226--226",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:STS,
  author =       "Ben McClure",
  title =        "Security tools, specs offer more protection",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "226--227",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803325",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CH,
  author =       "Ben McClure",
  title =        "Cry havoc",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "227--227",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803350",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ECC,
  author =       "Ben McClure",
  title =        "2 encryption cases cast shadow on academia",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "227--227",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:VPS,
  author =       "Ben McClure",
  title =        "Virus protection software",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "227--227",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:NFT,
  author =       "Ben McClure",
  title =        "{NT} firewalls: tough enough",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "227--228",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803362",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CCC,
  author =       "Ben McClure",
  title =        "Calling for a cyber cease-fire",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "228--228",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "229--230",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890253X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRc,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "231--232",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902553",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderMerwe:1998:SSC,
  author =       "Gert van der Merwe and Jan H. R. Eloff",
  title =        "Software source code, visual risk analysis: an
                 example",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "233--252",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coffey:1998:RMK,
  author =       "T. Coffey and T. Newe",
  title =        "Realisation of a minimum-knowledge identification and
                 signature scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "253--264",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Matyas:1998:RDM,
  author =       "Mike Matyas and Mohammad Peyravian and Allen Roginsky
                 and Nev Zunic",
  title =        "Reversible data mixing procedure for efficient
                 public-key encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "265--272",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898803404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "273--275",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pc,
  author =       "Anonymous",
  title =        "Pages 190--275 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Ed,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "278--279",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:SVb,
  author =       "Bill Hancock",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "280--292",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:BLC,
  author =       "August Bequai",
  title =        "Balancing legal concerns over crime and security in
                 cyberspace",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "293--298",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:CPM,
  author =       "Stephen Hinde",
  title =        "Contingency planning for the millennium",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "299--302",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:1998:CFI,
  author =       "Thomas Finne",
  title =        "A conceptual framework for information security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "303--307",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1998:FDF,
  author =       "Chris Pounder",
  title =        "Further developments in the field of encryption and
                 digital signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "308--312",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ratnasingham:1998:ESI,
  author =       "Pauline Ratnasingham",
  title =        "{EDI} security: the influences of trust on {EDI}
                 risks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "313--324",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:FBF,
  author =       "Ben McClure",
  title =        "The firewall behind the firewall",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "325--325",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:NAB,
  author =       "Ben McClure",
  title =        "{Network Associates to buy Dr Solomon's for \$640
                 million}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "325--325",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880014X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:MOV,
  author =       "Ben McClure",
  title =        "{S/MIME} and {OpenPGP} vie for security title",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "325--326",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AC,
  author =       "Ben McClure",
  title =        "Authentication central",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "326--326",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RPY,
  author =       "Ben McClure",
  title =        "A rescue plan for your {LAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "326--326",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:TMJ,
  author =       "Ben McClure",
  title =        "Thwarting malicious {Java} attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "326--326",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:SDC,
  author =       "Ben McClure",
  title =        "Serving up digital certificates",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "326--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:GSI,
  author =       "Ben McClure",
  title =        "{GTE} security for any {ISP}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "327--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:IBC,
  author =       "Ben McClure",
  title =        "{Internet} boosts cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "327--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:IST,
  author =       "Ben McClure",
  title =        "{Internet} security: trouble in the stack, Rik",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "327--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:MCS,
  author =       "Ben McClure",
  title =        "Mergers cut security options",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "327--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:WPB,
  author =       "Ben McClure",
  title =        "Want to prevent break ins?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "327--327",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AMS,
  author =       "Ben McClure",
  title =        "Adoption of {S/MIME} still lagging",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--328",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880028X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:C,
  author =       "Ben McClure",
  title =        "Certifiable",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--328",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:CSS,
  author =       "Ben McClure",
  title =        "{Cisco} strives to secure the enterprise",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--328",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:ISH,
  author =       "Ben McClure",
  title =        "{Internet} security holes widen",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--328",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:PFF,
  author =       "Ben McClure",
  title =        "Putting firewall in firmware",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--328",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AHN,
  author =       "Ben McClure",
  title =        "The {Achilles} Heel of next-generation satellites",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "328--329",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:EDH,
  author =       "Ben McClure",
  title =        "Encryption debate heats up in {Washington}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:GN,
  author =       "Ben McClure",
  title =        "Good news",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880031X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:IUS,
  author =       "Ben McClure",
  title =        "{IBM} unveils secure E-business products",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:VSV,
  author =       "Ben McClure",
  title =        "Verisign secures {VPN} links",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "329--329",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:FEH,
  author =       "Ben McClure",
  title =        "Firms exposed to hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "329--330",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:AVR,
  author =       "Ben McClure",
  title =        "Anti-virus rivals gang up over critical study",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:PNE,
  author =       "Ben McClure",
  title =        "Powerful new encryption standard delayed by weakness",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:RSS,
  author =       "Ben McClure",
  title =        "{RCMP} seizes \$90 000 in software bust",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:TRS,
  author =       "Ben McClure",
  title =        "From toy rings to sophisticated codes",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "330--330",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:TCD,
  author =       "Ben McClure",
  title =        "Taking the confusion out of digital certificates",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "330--331",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{McClure:1998:S,
  author =       "Ben McClure",
  title =        "{Smartcards}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "331--331",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "332--334",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902784",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRd,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "335--336",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902796",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1998:CSB,
  author =       "S. H. von Solms and J. H. S. Geldenhuys",
  title =        "Collecting security baggage on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "337--345",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Labuschagne:1998:URT,
  author =       "L. Labuschagne and J. H. R. Eloff",
  title =        "The use of real-time risk analysis to enable dynamic
                 activation of countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "347--357",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "358--360",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902802",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:CIa,
  author =       "Anonymous",
  title =        "{Compsec 98 International}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "361--365",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902814",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pd,
  author =       "Anonymous",
  title =        "Pages 278--366 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Ee,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "368--369",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:SV,
  author =       "Anonymous",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "370--380",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:TCF,
  author =       "August Bequai",
  title =        "Techno-crimes: Failings of the legal edifice",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "381--384",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:SRB,
  author =       "Stephen Hinde",
  title =        "Solar radiation is bad for you",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "385--388",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Benton:1998:PIS,
  author =       "J. R. Benton",
  title =        "Physical {IT} security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "389--391",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1998:ECT,
  author =       "Chris Pounder",
  title =        "{European Commission} takes action to secure the
                 {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "392--396",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Finne:1998:TCD,
  author =       "Thomas Finne",
  title =        "The three categories of decision-making and
                 information security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "397--405",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880045X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:ECT,
  author =       "Helen Meyer",
  title =        "Experts criticise `too risky' key recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:MCS,
  author =       "Helen Meyer",
  title =        "Managers are cutting security corners",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "406--406",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LGT,
  author =       "Helen Meyer",
  title =        "On-line groups try to beef up privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "406--407",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:ASD,
  author =       "Helen Meyer",
  title =        "Attacks spur detection efforts",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "407--407",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CAB,
  author =       "Helen Meyer",
  title =        "Call to arms to battle year 2000 problem",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "407--407",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:EBN,
  author =       "Helen Meyer",
  title =        "Experts blast {NT} for its security failings",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "407--407",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:EUE,
  author =       "Helen Meyer",
  title =        "{Europeans} unlock encryption market, thanks to {US}
                 rules",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "407--408",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CLI,
  author =       "Helen Meyer",
  title =        "Companies lap up insurer's anti-hacker protection
                 plan",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "408--408",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800540",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SUO,
  author =       "Helen Meyer",
  title =        "Single unit offers {Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "408--408",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:VNC,
  author =       "Helen Meyer",
  title =        "{VPNs} now can link to two-way pagers securely",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "408--408",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SP,
  author =       "Helen Meyer",
  title =        "{SOCKS} push",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "408--409",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:DNB,
  author =       "Helen Meyer",
  title =        "Don't neglect browser security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:PDS,
  author =       "Helen Meyer",
  title =        "{PGP} disk's security takes a bite out of crime",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "409--409",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800576",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:STB,
  author =       "Helen Meyer",
  title =        "Security tool blocks document misuse",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "409--410",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880059X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FRC,
  author =       "Helen Meyer",
  title =        "Firewall reality check",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880062X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:PP,
  author =       "Helen Meyer",
  title =        "Passwords to protection",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800606",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:TKH,
  author =       "Helen Meyer",
  title =        "Through the key holes",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "410--410",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SBD,
  author =       "Helen Meyer",
  title =        "Six biometric devices point the finger at security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "410--411",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LYF,
  author =       "Helen Meyer",
  title =        "Let your fingers do the logging in",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SCSb,
  author =       "Helen Meyer",
  title =        "Steel-cage security for {Windows}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "411--411",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "412--414",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902474",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "415--416",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902498",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caminada:1998:ISI,
  author =       "Martin Caminada and Reind van de Riet and Arjen van
                 Zanten and Leendert van Doom",
  title =        "{Internet} security incidents, a survey within {Dutch}
                 organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "417--433",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800667",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1998:ECS,
  author =       "S. H. von Solms",
  title =        "Electronic commerce with secure intelligent trade
                 agents",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "435--446",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898000121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Borcherding:1998:ETK,
  author =       "Birgit Borcherding and Malte Borcherding",
  title =        "Efficient and trustworthy key distribution in webs of
                 trust",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "447--454",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898000017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "455--457",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902516",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pe,
  author =       "Anonymous",
  title =        "Pages 368--457 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Ef,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "460--461",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:STG,
  author =       "Bill Hancock",
  title =        "Security tradeshows --- Good or bad?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "462--474",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:PSD,
  author =       "Stephen Hinde",
  title =        "Privacy and security --- The drivers for growth of
                 E-Commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "475--478",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800692",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1998:ARU,
  author =       "Chris Pounder",
  title =        "The Annual Report of the {UK} Data Protection
                 Registrar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "479--482",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1998:NRD,
  author =       "Fred Cohen",
  title =        "A note on the role of deception in information
                 protection",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "483--506",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800710",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kapidzic:1998:CSA,
  author =       "Nada Kapidzic",
  title =        "Creating security applications based on The Global
                 Certificate Management System",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "507--515",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:IHB,
  author =       "Helen Meyer",
  title =        "{IBM} hedges its bets on {SET}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800734",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SIS,
  author =       "Helen Meyer",
  title =        "Security integration to simplify user access",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "516--516",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800746",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:TAC,
  author =       "Helen Meyer",
  title =        "Titans aim at crypto stalemate",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "516--517",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FAF,
  author =       "Helen Meyer",
  title =        "Firewalls aren't failsafe",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800771",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HDG,
  author =       "Helen Meyer",
  title =        "Hacker defaces {German} pol site",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800783",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WUA,
  author =       "Helen Meyer",
  title =        "Warning for {UK} authorities over data matching",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "517--517",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880076X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CFG,
  author =       "Helen Meyer",
  title =        "Companies found guilty face criminal prosecutions",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "517--518",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:EPT,
  author =       "Helen Meyer",
  title =        "Encryption plan targets export restriction",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NRS,
  author =       "Helen Meyer",
  title =        "{Novell} remote security freebie now for sale",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "518--518",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SMC,
  author =       "Helen Meyer",
  title =        "Security, management converge",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "518--519",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:BLN,
  author =       "Helen Meyer",
  title =        "A better lock for 'Net data",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FEP,
  author =       "Helen Meyer",
  title =        "Firewall expands purview",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:RDE,
  author =       "Helen Meyer",
  title =        "In {Russia}: digital eavesdropping?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800850",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CGB,
  author =       "Helen Meyer",
  title =        "{Coast} Guard beefs up security after hack",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "519--520",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800862",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FSS,
  author =       "Helen Meyer",
  title =        "A false sense of security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NSB,
  author =       "Helen Meyer",
  title =        "Net security best policy for insurer",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:TTF,
  author =       "Helen Meyer",
  title =        "Technology and trust: the final analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LLV,
  author =       "Helen Meyer",
  title =        "{LAN-to-LAN VPNs}: secure enough?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NID,
  author =       "Helen Meyer",
  title =        "Is network intrusion detection software being used
                 correctly?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WPS,
  author =       "Helen Meyer",
  title =        "{WSS} put its stamp on E-mail security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "522--524",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898900591",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRf,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "525--526",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890061X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schumacher:1998:FFN,
  author =       "H. J. (Jerry) Schumacher and Sumit Ghosh",
  title =        "A Fundamental Framework for Network Security Towards
                 Enabling Security on Demand in an {ATM} Network",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "527--542",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489880093X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:1998:CDE,
  author =       "Chu-Hsing Lin and Tien-Chi Lee",
  title =        "A confused document encrypting scheme and its
                 implementation",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "543--551",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "553--555",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898900633",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:CIb,
  author =       "Anonymous",
  title =        "{Compsec 98 International}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "556--560",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898900657",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pf,
  author =       "Anonymous",
  title =        "Pages 460--560 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Eg,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "562--563",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800534",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:WRM,
  author =       "Bill Hancock",
  title =        "Windows-98, {RIP} and my Adrenaline Rush",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "564--574",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800546",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ford:1998:MYL,
  author =       "Richard Ford",
  title =        "{May} you live in interesting times",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "575--578",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:GCC,
  author =       "August Bequai",
  title =        "A guide to cyber-crime investigations",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "579--582",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980056X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:CGD,
  author =       "Stephen Hinde",
  title =        "Corporate governance and disasters",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "583--585",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800571",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1998:BC,
  author =       "Sarah Gordon",
  title =        "Breaking the chain",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "586--588",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Post:1998:UEA,
  author =       "Gerald Post and Albert Kagan",
  title =        "The use and effectiveness of anti-virus software",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "589--599",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1998:EIS,
  author =       "Gerald Kovacich",
  title =        "Establishing an Information Systems Security
                 Organization {(ISSO)}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "600--612",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800601",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:VPJ,
  author =       "Helen Meyer",
  title =        "`Virtual' privacy just not enough",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "613--613",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890284X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:VPN,
  author =       "Helen Meyer",
  title =        "Virus protection for notes and exchange",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "613--613",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902851",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SSYa,
  author =       "Helen Meyer",
  title =        "Security systems and the {Y2K} problem",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "613--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902863",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:BOS,
  author =       "Helen Meyer",
  title =        "Bundled offering secures links",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902899",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HEY,
  author =       "Helen Meyer",
  title =        "How to ensure your {Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902887",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NMU,
  author =       "Helen Meyer",
  title =        "Network managers unite over bug",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902905",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:PV,
  author =       "Helen Meyer",
  title =        "Protection from viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902875",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SPS,
  author =       "Helen Meyer",
  title =        "Security in Platinum setting",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--614",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902917",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WCY,
  author =       "Helen Meyer",
  title =        "To whom can you entrust security?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "614--615",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902929",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:UFR,
  author =       "Helen Meyer",
  title =        "{US} finally relaxes encryption policies",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "615--615",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902930",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SSD,
  author =       "Helen Meyer",
  title =        "Slam the spam door",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "615--616",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902942",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:ASC,
  author =       "Helen Meyer",
  title =        "{Axent}'s on security consulting",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890298X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CAF,
  author =       "Helen Meyer",
  title =        "Cryptographic accelerators face an uncertain future",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902978",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:IYS,
  author =       "Helen Meyer",
  title =        "Immunizing your system",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902966",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SCSc,
  author =       "Helen Meyer",
  title =        "This security catches on --- slowly",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "616--616",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902954",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:WGT,
  author =       "Helen Meyer",
  title =        "Who goes there?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "616--617",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898902991",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LIA,
  author =       "Helen Meyer",
  title =        "Locking down intranets from afar --- for less",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "617--617",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SSYb,
  author =       "Helen Meyer",
  title =        "Is someone stalking your network?",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "617--617",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903005",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:TGS,
  author =       "Helen Meyer",
  title =        "{TriStrata}: a giant step in enterprise security",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "617--617",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meye:1998:HHB,
  author =       "Helen Meye",
  title =        "How hackers break in \ldots{} and how they are
                 caught",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "618--618",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CI,
  author =       "Helen Meyer",
  title =        "Cryptography for the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "618--618",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HCS,
  author =       "Helen Meyer",
  title =        "How computer security works",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "618--618",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SF,
  author =       "Helen Meyer",
  title =        "Suspicious finds",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "618--618",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "619--620",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:E,
  author =       "Anonymous",
  title =        "Exhibitors",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "621--631",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890308X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "632--634",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRg,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "635--636",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schwemmlein:1998:RMR,
  author =       "J. Schwemmlein and K. C. Posch and R. Posch",
  title =        "{RNS-modulo} reduction upon a restricted base value
                 set and its applicability to {RSA} cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "637--650",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800613",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Pg,
  author =       "Anonymous",
  title =        "Pages 562--650 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:Eh,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "652--653",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1998:SVc,
  author =       "Bill Hancock",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "654--666",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1998:EAC,
  author =       "August Bequai",
  title =        "Employee abuses in cyberspace: {Management}'s legal
                 quagmire",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "667--670",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1998:THW,
  author =       "Stephen Hinde",
  title =        "Time, history and war: a personal voyage through
                 {Compsec '98}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "671--681",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800989",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Venter:1998:DPI,
  author =       "H. S. Venter and J. H. P. Eloff",
  title =        "Data packet intercepting on the {Internet}: How and
                 why? {A} closer look at existing data
                 packet-intercepting tools",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "683--692",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898800990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schwartau:1998:TBS,
  author =       "Winn Schwartau",
  title =        "Time-based security explained: Provable security
                 models and formulas for the practitioner and vendor",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "693--714",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898801004",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:IFS,
  author =       "John Meyer",
  title =        "{ISS} finds security {ANSA}",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "715--715",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404898903388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NON,
  author =       "John Meyer",
  title =        "{Netscape} offers new security tool",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "715--715",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898801016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SHL,
  author =       "John Meyer",
  title =        "Spate of hacking lets the cat out of the bag",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "715--716",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890339X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FSH,
  author =       "John Meyer",
  title =        "Firewalls stand the heat",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "716--716",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:MBF,
  author =       "John Meyer",
  title =        "{Microsoft} backs feds' encryption standard",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "716--716",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903406",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:DPS,
  author =       "John Meyer",
  title =        "Data protect and survive",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "716--717",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890342X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:NSU,
  author =       "John Meyer",
  title =        "Network security under attack? {Buy} insurance",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "717--717",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:RPH,
  author =       "John Meyer",
  title =        "Rich pickings for hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "717--717",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903431",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:SBA,
  author =       "John Meyer",
  title =        "{Symantec} buys anti-virus line",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "717--717",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903443",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:LFH,
  author =       "John Meyer",
  title =        "Low flying hackers pose growing threat",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "717--718",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903467",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FAS,
  author =       "John Meyer",
  title =        "Fraud artists surf new turf --- Cyberspace",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "718--718",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HGM,
  author =       "John Meyer",
  title =        "Hacks gain in malice, frequency",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "718--718",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:QCS,
  author =       "John Meyer",
  title =        "Quick cracking of secret code",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "718--719",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:BBG,
  author =       "John Meyer",
  title =        "Business is booming for the good-guy hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "719--719",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903522",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:FFN,
  author =       "John Meyer",
  title =        "First federal Net privacy law approved",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "719--719",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:HCG,
  author =       "John Meyer",
  title =        "Hackers can get to you by E-mail",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "719--719",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903510",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1998:CGS,
  author =       "John Meyer",
  title =        "E-commerce to get strict privacy rules",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "719--720",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903534",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "721--722",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903546",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:IBRh,
  author =       "Anonymous",
  title =        "International Board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "723--724",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898903558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chor:1998:GAS,
  author =       "Leong Peng Chor and Hsu Wen Jing and Tan Peng Chong",
  title =        "A geometric approach for shared secrets, a
                 refinement",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "725--732",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404898801028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "733--735",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489890356X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1998:Ph,
  author =       "Anonymous",
  title =        "Pages 652--735 (1998)",
  journal =      j-COMPUT-SECUR,
  volume =       "17",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1998",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:EB,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "2--2",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Ea,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "2--3",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ECC,
  author =       "Bill Hancock",
  title =        "Elliptical curve cryptography and standards for
                 efficient cryptography group",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "4--15",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1999:CCU,
  author =       "August Bequai",
  title =        "Cyber-crime the {US} experience",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "16--18",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:OOG,
  author =       "Stephen Hinde",
  title =        "One down, one to go",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "19--22",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1999:IPA,
  author =       "Chris Pounder",
  title =        "An initial plan of action for compliance with the
                 {UK}'s Data Protection Act 1998",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "23--27",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:1999:CHC,
  author =       "S. M. Furnell and M. J. Warren",
  title =        "Computer hacking and cyber terrorism: the real threats
                 in the new millennium?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "28--34",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Devargas:1999:SCI,
  author =       "Mario Devargas",
  title =        "Survival is not compulsory: an introduction to
                 business continuity planning",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "35--46",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caelli:1999:PEC,
  author =       "William J. Caelli and Edward P. Dawson and Scott A.
                 Rea",
  title =        "{PKI}, elliptic curve cryptography, and digital
                 signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "47--66",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980008X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Preneel:1999:SAC,
  author =       "Bart Preneel",
  title =        "State-of-the-art ciphers for commercial applications",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "67--74",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:FFS,
  author =       "Helen Meyer",
  title =        "Flak flies over secrecy on virus",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "75--75",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:UWC,
  author =       "Helen Meyer",
  title =        "Users warned on {CE} security flaws",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "75--75",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PCP,
  author =       "Helen Meyer",
  title =        "Passwords could be past tense by 2002",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "75--76",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CLA,
  author =       "Helen Meyer",
  title =        "Companies launch anti-virus education programme",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "76--76",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CPF,
  author =       "Helen Meyer",
  title =        "{Compaq} points fingerprints at security hole",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "76--76",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CPS,
  author =       "Helen Meyer",
  title =        "Crypto paper set for {January} launch",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "76--76",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:AIA,
  author =       "Helen Meyer",
  title =        "Active infections attack",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "76--77",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CYA,
  author =       "Helen Meyer",
  title =        "Can you afford not to invest in security?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "77--77",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800170",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:HTP,
  author =       "Helen Meyer",
  title =        "Hacker trial postponed",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "77--77",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800182",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:IAP,
  author =       "Helen Meyer",
  title =        "International agreement pees encryption at 64",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "77--78",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:IDS,
  author =       "Helen Meyer",
  title =        "Interoperability drives security alliances",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "78--78",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800200",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:TS,
  author =       "Helen Meyer",
  title =        "Tapping away at security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "78--78",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:DOS,
  author =       "Helen Meyer",
  title =        "Doors open to simpler {VPNs}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "78--79",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MMH,
  author =       "Helen Meyer",
  title =        "Making the most of hacker fears",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "79--79",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800236",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SS,
  author =       "Helen Meyer",
  title =        "Stronghold of security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "79--79",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:WWA,
  author =       "Helen Meyer",
  title =        "Will we all be secure in the new world?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "79--80",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980025X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:KYE,
  author =       "Helen Meyer",
  title =        "Know your enemy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "80--80",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800261",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Ca,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "81--82",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "83--85",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pa,
  author =       "Anonymous",
  title =        "Pages 2--85 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Eb,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "88--89",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990007X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WFP,
  author =       "Bill Hancock",
  title =        "Want a free {PC}? give up your privacy, first",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "90--90",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900093",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:PPR,
  author =       "Bill Hancock",
  title =        "Privacy problems on the rise",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "90--92",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:NPS,
  author =       "Bill Hancock",
  title =        "{NT} passwords for sale",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "92--92",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900135",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ITG,
  author =       "Bill Hancock",
  title =        "{Internet2} testbed going online at a network near
                 you",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "93--94",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WCT,
  author =       "Bill Hancock",
  title =        "When {Cisco} talks about {VPNs} \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "94--94",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MOV,
  author =       "Bill Hancock",
  title =        "{MS Office 2000} virus infestation --- Already",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "94--95",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:SRA,
  author =       "Bill Hancock",
  title =        "Security research alliance begins",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "95--95",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:PCA,
  author =       "Bill Hancock",
  title =        "Pessimism in cyberspace is alive and well",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "95--96",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:NIT,
  author =       "Bill Hancock",
  title =        "New {IETF} task force on intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "96--96",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900251",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UDD,
  author =       "Bill Hancock",
  title =        "{U.S. Department of Defense} worries about event
                 exposure via aggregation techniques",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "97--97",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MRA,
  author =       "Bill Hancock",
  title =        "Medical records accidentally posted to the web",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "98--98",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900299",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WNS,
  author =       "Bill Hancock",
  title =        "{Windows-NT} Service {Pack} 4 security woes",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "98--98",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900317",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:EPP,
  author =       "Bill Hancock",
  title =        "{European Parliament} promotes a safer {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "98--99",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900330",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WRR,
  author =       "Bill Hancock",
  title =        "Windows-2000 requires re-building of code",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "99--99",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:BBB,
  author =       "Bill Hancock",
  title =        "{Better Business Bureau} gets involved in online
                 privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "99--100",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900378",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FLC,
  author =       "Bill Hancock",
  title =        "{France} lightens up cryptographic use",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "100--100",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:TCB,
  author =       "Bill Hancock",
  title =        "Teen crackers being used by professional thieves",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "100--101",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990041X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IWN,
  author =       "Bill Hancock",
  title =        "Information warfare --- The next front",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "101--102",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900433",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:SVH,
  author =       "Bill Hancock",
  title =        "Students in {Virginia} hacks {NASA}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "102--103",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UCA,
  author =       "Bill Hancock",
  title =        "A unique {Canadian} approach --- Invite the hacker to
                 nail your networks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "103--104",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ford:1999:MTR,
  author =       "Richard Ford",
  title =        "Malware: Troy revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "105--108",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1999:MEC,
  author =       "August Bequai",
  title =        "Monitoring employee communications in cyberspace: the
                 pitfalls facing management",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "109--112",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:YU,
  author =       "Stephen Hinde",
  title =        "Year 2000 update",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "113--119",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800297",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gordon:1999:TT,
  author =       "Sarah Gordon",
  title =        "Telephone tales",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "120--123",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900494",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schwartau:1999:SDS,
  author =       "Winn Schwartau",
  title =        "Surviving denial of service",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "124--133",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900512",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:1999:SSK,
  author =       "Mohammad Peyravian and Don Coppersmith",
  title =        "A structured symmetric-key block cipher",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "134--147",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900536",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:FSS,
  author =       "Helen Meyer",
  title =        "Fingerprint sensors solve security problems",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "149--149",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800303",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:VPC,
  author =       "Helen Meyer",
  title =        "Vendors plan chip-level security systems",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "149--149",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800315",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:BAB,
  author =       "Helen Meyer",
  title =        "56-bit {DES} algorithm broken in record time",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "149--150",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800327",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:HSH,
  author =       "Helen Meyer",
  title =        "{HTML} security hole in {Excel} can invade {PCs}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "150--150",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800352",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:NHT,
  author =       "Helen Meyer",
  title =        "Netbus hacker tool presents a greater threat to
                 {Windows} shops than {BackOrifice}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "150--150",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800339",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:TTB,
  author =       "Helen Meyer",
  title =        "Think twice before becoming a hacker attacker",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "150--150",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800340",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PGB,
  author =       "Helen Meyer",
  title =        "Privacy group blasts new cryptography laws",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "151--151",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PHM,
  author =       "Helen Meyer",
  title =        "{PKI} heads for mainstream",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "151--151",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800364",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SES,
  author =       "Helen Meyer",
  title =        "Security elite {SWAT} at viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "151--151",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800376",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PPC,
  author =       "Helen Meyer",
  title =        "{PGP} 6.0: {Pro} Crypto suite gets personal",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "151--152",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980039X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:HGJ,
  author =       "Helen Meyer",
  title =        "Hacker gets jail time for {ISP} break-ins",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "152--152",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800406",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:RGU,
  author =       "Helen Meyer",
  title =        "{RSA} goes down under to dodge export laws",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "152--152",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980042X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:YMM,
  author =       "Helen Meyer",
  title =        "{Y2K} may mask hacker attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "152--152",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:VRC,
  author =       "Helen Meyer",
  title =        "Vendors to roll out centralized security tools,
                 services",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "152--153",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800431",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:LYD,
  author =       "Helen Meyer",
  title =        "Lock up your data",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MCC,
  author =       "Helen Meyer",
  title =        "{Motorola CipherNET} certifies security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800467",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SSS,
  author =       "Helen Meyer",
  title =        "{Sidewinder Security Server 4.0}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "153--153",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800443",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SBJ,
  author =       "Helen Meyer",
  title =        "Server-based {Java} security products help guard your
                 enterprise flank",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "153--154",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MIW,
  author =       "Helen Meyer",
  title =        "Making {IPSec} work for you",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:NSA,
  author =       "Helen Meyer",
  title =        "Network security for all",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "154--154",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Cb,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "155--156",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990055X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:AIV,
  author =       "Anonymous",
  title =        "Author index for volume 17",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "157--157",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:SIV,
  author =       "Anonymous",
  title =        "Subject index for volume 17",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "158--162",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800510",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRa,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "163--164",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900573",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harris:1999:FC,
  author =       "Brendon Harris and Ray Hunt",
  title =        "Fairwall certification",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "165--177",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800522",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "178--180",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899900597",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pb,
  author =       "Anonymous",
  title =        "Pages 88--180 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Ec,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "182--183",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800625",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IIT,
  author =       "Bill Hancock",
  title =        "Internal information theft in {US} on the rise",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "184--184",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MMA,
  author =       "Bill Hancock",
  title =        "{Melissa} the macrovirus has an author \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "184--186",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800637",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:EAS,
  author =       "Bill Hancock",
  title =        "{eBay} auction site gets compromised",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "186--186",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CGI,
  author =       "Bill Hancock",
  title =        "{China} glides into {Internet} mainstream",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "186--188",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FIM,
  author =       "Bill Hancock",
  title =        "First {Internet} e-mail corporate usage report;
                 concludes e-mail abuse at epidemic levels",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "188--188",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990915X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CFS,
  author =       "Bill Hancock",
  title =        "1999 {CSI\slash FBI} survey: Cyberattacks on the
                 rise",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "188--189",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FMS,
  author =       "Bill Hancock",
  title =        "`Free-mail' systems great targets for hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "189--189",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UFA,
  author =       "Bill Hancock",
  title =        "{US} feds ask for public sector help to prosecute
                 cybercrime",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "189--190",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:NMC,
  author =       "Bill Hancock",
  title =        "{Novell} maybe causing privacy concerns with {\em
                 digitalme}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "190--191",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ASC,
  author =       "Bill Hancock",
  title =        "Anonymizer service could compromise {Kosovar}
                 residents need for privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "191--192",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UGS,
  author =       "Bill Hancock",
  title =        "{US Government} states protections needed for
                 companies to come forward with cyberattack reports",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "192--192",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:PII,
  author =       "Bill Hancock",
  title =        "{Pentium III ID} cracked by {German} group",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "192--193",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:SBC,
  author =       "Bill Hancock",
  title =        "{SAFE} bill clears next hurdle in {US} legislature",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "193--193",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MFV,
  author =       "Bill Hancock",
  title =        "More fraud: {Visa International} states e-commerce is
                 major fraud source",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "194--194",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:OFI,
  author =       "Bill Hancock",
  title =        "Online fraud increasing rapidly",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "194--194",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:BOP,
  author =       "Bill Hancock",
  title =        "Back orifice prevention tool to be released",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "195--195",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ICK,
  author =       "Bill Hancock",
  title =        "Interpol calls for key recovery",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "195--195",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WWW,
  author =       "Bill Hancock",
  title =        "World wide web abusive use widespread",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "195--196",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:KMF,
  author =       "Bill Hancock",
  title =        "{Kevin Mitnick} finally gets a plea --- and a
                 sentence",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "196--197",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990929X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:OTL,
  author =       "Bill Hancock",
  title =        "One in three local authorities in the {UK} vulnerable
                 to privacy cyberattacks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "197--198",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:YC,
  author =       "Stephen Hinde",
  title =        "Are you in control?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "199--203",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schultz:1999:WNS,
  author =       "E. Eugene Schultz",
  title =        "{Windows NT} security: Kudos, concerns, and
                 prescriptions",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "204--210",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800650",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1999:WRC,
  author =       "Gerald L. Kovacich",
  title =        "I-way robbery: Crime on the {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "211--220",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800662",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hughes:1999:CIO,
  author =       "John Hughes",
  title =        "Certificate inter-operability --- white paper",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "221--230",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:FFE,
  author =       "Helen Meyer",
  title =        "Free file encryption offered",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "231--231",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PCV,
  author =       "Helen Meyer",
  title =        "Protection from {Chernobyl} virus",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "231--231",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:WDP,
  author =       "Helen Meyer",
  title =        "{Web} data-protection offerings readied",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "231--231",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990932X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MWJ,
  author =       "Helen Meyer",
  title =        "{MCI WorldCom} joins managed security fray",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "231--232",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:EOR,
  author =       "Helen Meyer",
  title =        "{European} organizations at risk from virus
                 infection",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "232--232",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:STFa,
  author =       "Helen Meyer",
  title =        "Security takes front seat at {Pentium} preview",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "232--232",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:HCR,
  author =       "Helen Meyer",
  title =        "Harmonized copyright rules across {Europe}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "232--233",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:AIC,
  author =       "Helen Meyer",
  title =        "20\% annual increase on card fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "233--233",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:PBV,
  author =       "Helen Meyer",
  title =        "Providers beef up {VPNs} with security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "233--233",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:BSE,
  author =       "Helen Meyer",
  title =        "Better snapshots of enterprise security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "233--234",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CS,
  author =       "Helen Meyer",
  title =        "Cybercop scanner",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "234--234",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SEI,
  author =       "Helen Meyer",
  title =        "Strong encryption for internal use only?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "234--234",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:STFb,
  author =       "Helen Meyer",
  title =        "Security teams failing to shine",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "234--234",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909434",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CIT,
  author =       "Helen Meyer",
  title =        "To catch an {Internet} thief",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "234--235",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909446",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:NHA,
  author =       "Helen Meyer",
  title =        "The need for host authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "235--235",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:CCV,
  author =       "Helen Meyer",
  title =        "Combating computer viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "235--236",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990946X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MBT,
  author =       "Helen Meyer",
  title =        "More bark than bite",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "236--236",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909495",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:MNS,
  author =       "Helen Meyer",
  title =        "Mapping a network security strategy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "236--236",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909483",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:1999:SWN,
  author =       "Helen Meyer",
  title =        "Securing windows {NT} server",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "236--236",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909471",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Cc,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "237--238",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909501",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRb,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "239--240",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909513",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bontchev:1999:PWV,
  author =       "Vesselin Bontchev",
  title =        "The problems of {WordMacro} Virus upconversion",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "241--255",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:1999:MML,
  author =       "S. H. von Solms and J. H. S. Geldenhuys",
  title =        "Managing multi level security in a military intranet
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "257--270",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "271--273",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899909525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pc,
  author =       "Anonymous",
  title =        "Pages 182--273 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Ed,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "276--277",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800704",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ACP,
  author =       "Bill Hancock",
  title =        "Appeals-court panel says expor ban on encryption
                 software is unlawful",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "278--279",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800716",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:HAU,
  author =       "Bill Hancock",
  title =        "Hackers attack {US} Government web sites in protest of
                 {Chinese} embassy bombing",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "279--279",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990696X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:EBH,
  author =       "Bill Hancock",
  title =        "{EU} bill holds {ISPs} liable for web content",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "279--280",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906971",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FAY,
  author =       "Bill Hancock",
  title =        "{FTC} accuses young investor site of privacy
                 violations, but what's a webmaster to do? {Call} {Mom}
                 and {Dad} on each page access?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "280--282",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:NIL,
  author =       "Bill Hancock",
  title =        "New {Internet} legislation attempts in the {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "282--282",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:BAY,
  author =       "Bill Hancock",
  title =        "Being all that you can virtually be --- cyberwar
                 education gets formal",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "282--283",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:TIW,
  author =       "Bill Hancock",
  title =        "Theft of information in the workplace creates growing
                 concern for corporate {America}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "283--283",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:URN,
  author =       "Bill Hancock",
  title =        "{US} releases new data privacy guidelines",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "284--284",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:BFM,
  author =       "Bill Hancock",
  title =        "45\% of big firms monitor workers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "284--285",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:EUC,
  author =       "Bill Hancock",
  title =        "Experts: Use caution with white-hat hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "285--285",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MOP,
  author =       "Bill Hancock",
  title =        "{Microsoft} to offer privacy tools",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "285--286",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:URB,
  author =       "Bill Hancock",
  title =        "{UK} report blows government {Internet} security sky
                 high",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "286--287",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990706X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:RSG,
  author =       "Bill Hancock",
  title =        "Risks to security growing as fast as numbers of
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "287--288",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UNL,
  author =       "Bill Hancock",
  title =        "{US} nuclear labs find counterespionage difficult",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "288--288",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IUF,
  author =       "Bill Hancock",
  title =        "{Internet} users furious over {SingTel}'s computer
                 security probe",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "288--289",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907095",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:VBM,
  author =       "Bill Hancock",
  title =        "{VPNs} build momentum",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "289--291",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:PSB,
  author =       "Bill Hancock",
  title =        "Parents seek blocks for web sites",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "291--292",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ISE,
  author =       "Bill Hancock",
  title =        "Information society in the {EU}: Digital signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "292--293",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CPP,
  author =       "Bill Hancock",
  title =        "{Clinton} proposes privacy controls",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "293--294",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907137",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:EG,
  author =       "Stephen Hinde",
  title =        "{$E$} for exponential growth",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "295--299",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800728",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ford:1999:NSM,
  author =       "Richard Ford",
  title =        "No suprises in {Melissa} Land",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "300--302",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980073X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bequai:1999:EIL,
  author =       "August Bequai",
  title =        "Employers and the {Internet}: Legal woes and
                 concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "303--306",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800741",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pounder:1999:RVB,
  author =       "Chris Pounder",
  title =        "The revised version of {BS7799} --- so what's new?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "307--311",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800753",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bulmer:1999:EDU,
  author =       "Garry Bulmer",
  title =        "Encryption --- Do or die for {UK} business",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "312--316",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800765",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ratnasingham:1999:ITR,
  author =       "Pauline Ratnasingham",
  title =        "Implicit trust in the risk assessment process of
                 {EDI}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "317--321",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800777",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buzzard:1999:CSW,
  author =       "Keith Buzzard",
  title =        "Computer security --- What should you spend your money
                 on?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "322--334",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800789",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:EAS,
  author =       "Sandy Nichol",
  title =        "Electronic attack: Serbs bombard {Internet} with
                 mail",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "335--335",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800790",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:WDP,
  author =       "Sandy Nichol",
  title =        "What to do to prevent attack",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "335--335",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/0167404899907149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:MM,
  author =       "Sandy Nichol",
  title =        "{Melissa}'s mayhem",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "335--336",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:MVW,
  author =       "Sandy Nichol",
  title =        "{Melissa} virus wakes up {IT} world",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "336--336",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:PCP,
  author =       "Sandy Nichol",
  title =        "Privacy concerns over {Pentium III} launch",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "336--336",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SEB,
  author =       "Sandy Nichol",
  title =        "Security is in the eye of the beholder",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "336--336",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:WES,
  author =       "Sandy Nichol",
  title =        "Weigh in on encryption standard",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "336--336",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SY,
  author =       "Sandy Nichol",
  title =        "Secure yourself",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "336--337",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907204",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:DHL,
  author =       "Sandy Nichol",
  title =        "Deployment hurdles: look before you leap",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "337--337",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907228",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SO,
  author =       "Sandy Nichol",
  title =        "Security from the outside",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "337--337",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:GWS,
  author =       "Sandy Nichol",
  title =        "Get wise to software viruses",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "337--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990723X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:AHK,
  author =       "Sandy Nichol",
  title =        "{Aussie} hackers as key escrow alternative",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CSY,
  author =       "Sandy Nichol",
  title =        "{Chem} sector {Y2K} ready?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907277",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:NVW,
  author =       "Sandy Nichol",
  title =        "{Novell} virtual wallet raises security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907265",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:PVC,
  author =       "Sandy Nichol",
  title =        "Password vulnerability cited as cracker hacks {Ebay}
                 site",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907289",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:TFF,
  author =       "Sandy Nichol",
  title =        "Top firms fail virus test",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--338",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907253",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:VCS,
  author =       "Sandy Nichol",
  title =        "{VPN} client software needs to be made simpler",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "338--339",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907290",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:GSH,
  author =       "Sandy Nichol",
  title =        "Government site hacked",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "339--339",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907320",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:NSB,
  author =       "Sandy Nichol",
  title =        "Net surfers: Beware of hole",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "339--339",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:NWW,
  author =       "Sandy Nichol",
  title =        "{Novell} wages war on {Israeli} software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "339--339",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907307",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SMG,
  author =       "Sandy Nichol",
  title =        "Software maker gets {OK} to ship abroad",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "339--339",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907332",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:IS,
  author =       "Sandy Nichol",
  title =        "{Internet} security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "339--340",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:VFA,
  author =       "Sandy Nichol",
  title =        "{VPN} false alarms can be diminished",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "340--340",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907368",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:VUV,
  author =       "Sandy Nichol",
  title =        "{VLANs} usurped by virtual private networks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "340--340",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Cd,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "341--342",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990737X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRc,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "343--344",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907381",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:1999:HBE,
  author =       "Mohammad Peyravian and Allen Roginsky and Nev Zunic",
  title =        "Hash-based encryption system",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "345--350",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800807",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kuhnhauser:1999:PG,
  author =       "Winfried E. K{\"u}hnhauser",
  title =        "Policy Groups",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "351--363",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800819",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "365--367",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907393",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pd,
  author =       "Anonymous",
  title =        "Pages 276--367 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Ee,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "370--371",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800820",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CBC,
  author =       "Bill Hancock",
  title =        "{Clinton} backs cyber-plan against {Milosevic} ---
                 Report",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "372--372",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UMM,
  author =       "Bill Hancock",
  title =        "{US} moving for more privacy controls over data",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "372--373",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800832",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MCM,
  author =       "Bill Hancock",
  title =        "Mobile code malicious applets cause problems for {IT}
                 managers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "373--374",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905862",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WYD,
  author =       "Bill Hancock",
  title =        "What you don't know about your online rights might
                 hurt you",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "375--376",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MS,
  author =       "Bill Hancock",
  title =        "Music Security?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "376--376",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IVO,
  author =       "Bill Hancock",
  title =        "{ISPs} and {VPNs} are at odds with each other",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "376--380",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:NSP,
  author =       "Bill Hancock",
  title =        "The new school paradigm: Metal detectors, roving
                 patrols, firewalls, cyberwalls and encryption
                 \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "380--380",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UEC,
  author =       "Bill Hancock",
  title =        "{UK} Electronic Commerce Bill may require escrow",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "380--381",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:ASP,
  author =       "Bill Hancock",
  title =        "Application Service Provider {(ASP)} hosting centers
                 are a security problem",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "381--382",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FBD,
  author =       "Bill Hancock",
  title =        "Fingerprint biometrics devices just not catching on in
                 the real world",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "382--383",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990593X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IMW,
  author =       "Bill Hancock",
  title =        "Information managers want more and better {IT}
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "383--385",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IAG,
  author =       "Bill Hancock",
  title =        "The {InfraGard} alliance --- Getting the {Feds} and
                 {IT} managers on the same page",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "385--386",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MWG,
  author =       "Bill Hancock",
  title =        "{Microsoft}'s {Windows OS} getting a security
                 makeover",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "386--386",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:OSE,
  author =       "Bill Hancock",
  title =        "Outsourced security --- {EDS} tries to go large with
                 new unit",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "386--387",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:YMR,
  author =       "Bill Hancock",
  title =        "You may be right, there may be law on your side, and
                 you may not necessarily win when you sue \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "387--388",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905989",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:WEE,
  author =       "Bill Hancock",
  title =        "Wiretaps in {Europe} --- {EU} debates a resolution",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "388--389",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899905990",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UAB,
  author =       "Bill Hancock",
  title =        "{US} Authorities bust 45M {Internet} credit card
                 billing scam",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "389--390",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906004",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Docherty:1999:MAW,
  author =       "Paul Docherty and Peter Simpson",
  title =        "Macro attacks: What next after {Melissa}?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "391--395",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800844",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:MCS,
  author =       "Stephen Hinde",
  title =        "E-mail can seriously damage your health",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "396--406",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800856",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nelms:1999:IMR,
  author =       "Chris Nelms",
  title =        "{Internet} E-mail risks and concerns",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "409--418",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800868",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hawkins:1999:SWM,
  author =       "Nick Hawkins",
  title =        "Security within multimedia networked conferencing",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "419--422",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980087X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moreau:1999:ELF,
  author =       "Thierry Moreau",
  title =        "The emergence of a legal framework for electronic
                 transactions",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "423--428",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800881",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jarvis:1999:CEB,
  author =       "Neil Jarvis",
  title =        "E-commerce and encryption: Barriers to growth",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "429--431",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800893",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CUS,
  author =       "Sandy Nichol",
  title =        "{Canada} urged to step up computer security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "432--432",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980090X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CYC,
  author =       "Sandy Nichol",
  title =        "Concerns over {Y2K} cut funds for security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "432--432",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800911",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:YEOa,
  author =       "Sandy Nichol",
  title =        "For your eyes only",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "432--433",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800923",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CBFa,
  author =       "Sandy Nichol",
  title =        "E-commerce Bill is flawed and lacking in direction,
                 say {MPs}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "433--433",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800935",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:FST,
  author =       "Sandy Nichol",
  title =        "{FBI} sting targets computer hackers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "433--433",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800947",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SWI,
  author =       "Sandy Nichol",
  title =        "{SEC} warns on {Internet} trading",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "433--433",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800959",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:JSB,
  author =       "Sandy Nichol",
  title =        "{Java} security bug found, patched",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "434--434",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/java.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800960",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:RMH,
  author =       "Sandy Nichol",
  title =        "{Russia} may hold off {Y2K} tests",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "434--434",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800972",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SB,
  author =       "Sandy Nichol",
  title =        "Be a standard bearer",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "434--434",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800984",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:TCS,
  author =       "Sandy Nichol",
  title =        "Threat of cyber sabotage increases",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "434--435",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899800996",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:BUC,
  author =       "Sandy Nichol",
  title =        "{BSA} uncovers counterfeit of itself",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "435--435",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:LPM,
  author =       "Sandy Nichol",
  title =        "Legislation protects mail from employers' snooping",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "435--435",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:NSS,
  author =       "Sandy Nichol",
  title =        "Net security scare for {Microsoft}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "435--435",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980100X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:ERP,
  author =       "Sandy Nichol",
  title =        "Encryption row, part 2",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "435--436",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:EKU,
  author =       "Sandy Nichol",
  title =        "Escrow key to {US} espionage",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "436--436",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:EUDa,
  author =       "Sandy Nichol",
  title =        "{Europe} and {US} disagree on privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "436--436",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:IIH,
  author =       "Sandy Nichol",
  title =        "{IT} industry hit hard by software piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "436--436",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:UCT,
  author =       "Sandy Nichol",
  title =        "{UK} companies trust in non-existent security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "436--437",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:DTA,
  author =       "Sandy Nichol",
  title =        "Duchy is taking up arms for cyber wars",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "437--437",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:MMC,
  author =       "Sandy Nichol",
  title =        "{Melissa} mutates into copycat virus via {RTF}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "437--437",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:VTS,
  author =       "Sandy Nichol",
  title =        "Veto threat shadows {Y2K} bill",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "437--437",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Ce,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "438--439",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCe,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "440--442",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990603X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRd,
  author =       "Anonymous",
  title =        "{International Board of Referees}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "443--444",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899906041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{King:1999:STA,
  author =       "R. A. King and Mr T. C. Phipps",
  title =        "{Shannon}, {TESPAR} and approximation strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "445--453",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pe,
  author =       "Anonymous",
  title =        "Pages 370--453 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Ef,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "456--457",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:FSA,
  author =       "Bill Hancock",
  title =        "Finalists selected in {AES} bake-off",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "458--458",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:VCH,
  author =       "Bill Hancock",
  title =        "It's vogue to capture hackers, not just watch",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "458--459",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:SSE,
  author =       "Bill Hancock",
  title =        "Statistics show {European} security spending will
                 quadruple by 2003",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "459--460",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CAS,
  author =       "Bill Hancock",
  title =        "{Cisco} announces security associate partnership
                 programme",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "460--461",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:OSC,
  author =       "Bill Hancock",
  title =        "Outsourced security --- The corporate information
                 security burglar alarm hits {IT}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "461--462",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:MOS,
  author =       "Bill Hancock",
  title =        "Making the operating system trusted --- a trend",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "462--463",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908325",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:HPI,
  author =       "Bill Hancock",
  title =        "Hardening of an {OS} by putting it out for hack
                 attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "463--464",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CIW,
  author =       "Bill Hancock",
  title =        "{China}'s internal war with the {Falun Gong} sect
                 spills onto {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "464--465",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:IEM,
  author =       "Bill Hancock",
  title =        "And if that is not enough --- {Mainland China} and
                 {Taiwan} engage in cyberwar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "465--466",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908350",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:JCC,
  author =       "Bill Hancock",
  title =        "Join {Chaos Computer Club} for that summer retreat you
                 have been longing to attend \ldots{}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "466--466",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908362",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CPO,
  author =       "Bill Hancock",
  title =        "{Congressional} probe of online banking finds flaws",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "466--467",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:UPG,
  author =       "Bill Hancock",
  title =        "{US} plan for government-owned infrastructure
                 intrusion detection system draws fire",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "467--468",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:BCG,
  author =       "Bill Hancock",
  title =        "{British} cyberpolice get new powers for good vs.
                 evil",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "468--469",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CAC,
  author =       "Bill Hancock",
  title =        "Conference to address combating {Internet} child
                 pornography",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "469--469",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:CDN,
  author =       "Bill Hancock",
  title =        "Cybersquatting on domain names gets bitten by new laws
                 in {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "469--470",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Robb:1999:DFT,
  author =       "David Robb",
  title =        "Developing firewall technology: Hardwall --- White
                 paper",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "471--478",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980114X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:1999:SCA,
  author =       "Fred Cohen",
  title =        "Simulating cyber attacks, defences, and consequences",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "479--518",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:DPD,
  author =       "Sandy Nichol",
  title =        "Data protection dispute exposes core differences",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990843X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:PVH,
  author =       "Sandy Nichol",
  title =        "Powerful virus hits computers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "519--519",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:DCF,
  author =       "Sandy Nichol",
  title =        "Developing countries `face {Y2K} trade problems'",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "519--520",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801163",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CIP,
  author =       "Sandy Nichol",
  title =        "Card issuers push security plan",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:LC,
  author =       "Sandy Nichol",
  title =        "Laying down cyberlaw",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:RSU,
  author =       "Sandy Nichol",
  title =        "Report says {US} has backdoor to notes",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "520--520",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CBFb,
  author =       "Sandy Nichol",
  title =        "E-commerce Bill faces the axe",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "520--521",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:BCI,
  author =       "Sandy Nichol",
  title =        "Bug circumvents {IE5} passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:HND,
  author =       "Sandy Nichol",
  title =        "Hacking in the name of democracy in {China}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:ISM,
  author =       "Sandy Nichol",
  title =        "{Internet} systems `must be easily accessible by
                 police'",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:YEOb,
  author =       "Sandy Nichol",
  title =        "For your ears only: inexpensive telephone encryption
                 arrives",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "521--521",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:SPG,
  author =       "Sandy Nichol",
  title =        "Software piracy grows in {Canada}, dips in {US}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "521--522",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:HOD,
  author =       "Sandy Nichol",
  title =        "Hackers open door to {Windows}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908556",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:LTC,
  author =       "Sandy Nichol",
  title =        "Legislative threat to E-commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:MWO,
  author =       "Sandy Nichol",
  title =        "{MCI Worldcom} offers outsourced global {VPNs}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:TC,
  author =       "Sandy Nichol",
  title =        "Tales of the cryptochip",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "522--522",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:APA,
  author =       "Sandy Nichol",
  title =        "Anti-piracy alliance under fire",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "522--523",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990857X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:BBW,
  author =       "Sandy Nichol",
  title =        "Big brother is watching you",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908581",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:CBI,
  author =       "Sandy Nichol",
  title =        "City braces itself for cyber attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:EUDb,
  author =       "Sandy Nichol",
  title =        "{EU}-{US} data privacy dispute to continue",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:PSV,
  author =       "Sandy Nichol",
  title =        "{PDAs} spread virus epidemics",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "523--523",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489990860X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:ATM,
  author =       "Sandy Nichol",
  title =        "Audit trails might have fingered {Los Alamos}
                 insiders",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:BCN,
  author =       "Sandy Nichol",
  title =        "Bug cracks {NT} open",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:MRC,
  author =       "Sandy Nichol",
  title =        "Many {Russian} computers still aren't {Y2K} ready",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908635",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nichol:1999:RNS,
  author =       "Sandy Nichol",
  title =        "Report: {NASA} system vulnerable because of lax
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "524--524",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Cf,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "525--526",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRe,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "531--532",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bernaschi:1999:ENS,
  author =       "M. Bernaschi and E. d' Aiutolo and P. Rughetti",
  title =        "Enforcing network security: a real cease study in a
                 research organization",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "533--543",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCf,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "545--547",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899908684",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pf,
  author =       "Anonymous",
  title =        "Pages 456--547 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "6",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:Eg,
  author =       "Bill Hancock",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "550--552",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820008",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hancock:1999:SV,
  author =       "Bill Hancock",
  title =        "Security views",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "553--564",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489982001X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:BTB,
  author =       "Stephen Hinde",
  title =        "The bell tolls for the bell-shaped curve: or how hot
                 magnets, species distribution and things that go bump
                 in the air will change our view of risk",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "565--572",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kovacich:1999:HFF,
  author =       "Gerald L. Kovacich",
  title =        "Hackers: Freedom fighters of the {21-st} Century",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "573--576",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820033",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collins:1999:TCPa,
  author =       "Michael Collins",
  title =        "Telecommunications crime --- {Part 1}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "577--586",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820045",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ratnasingham:1999:RLT,
  author =       "Pauline Ratnasingham",
  title =        "Risks in low trust among trading partners in
                 electronic commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "587--592",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820057",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:CMR,
  author =       "Anonymous",
  title =        "{Canada} may reap benefit of software privacy rule",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "593--593",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:NNA,
  author =       "Anonymous",
  title =        "{NEC}'s network architecture saves data from crashes",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "593--593",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820070",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:T,
  author =       "Anonymous",
  title =        "Twinkle",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "593--593",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820082",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:EWP,
  author =       "Anonymous",
  title =        "Enemy within poses a fraud risk",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "593--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:BFCa,
  author =       "Anonymous",
  title =        "`Bug' fears cut demand for {Japanese} bonds",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "594--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820112",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:FPI,
  author =       "Anonymous",
  title =        "{France} to propose {Internet} legislation; focus is
                 on security",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "594--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ICE,
  author =       "Anonymous",
  title =        "{IPv6} chaos to eclipse {Y2K}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "594--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:NPL,
  author =       "Anonymous",
  title =        "New {Polish} law to fight intellectual property
                 theft",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "594--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820100",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:SFR,
  author =       "Anonymous",
  title =        "Security flaws reported in {BC}'s prescription drug
                 network",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "594--594",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:MFU,
  author =       "Anonymous",
  title =        "{Microsoft} faces user pressure on licences",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--595",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:MIA,
  author =       "Anonymous",
  title =        "Multi-industry alliance to beat piracy",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--595",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489982015X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:NTS,
  author =       "Anonymous",
  title =        "{NASA} technology sends porn into space",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--595",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:TFY,
  author =       "Anonymous",
  title =        "Top firms on {Y2K} danger list",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--595",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820197",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:TWP,
  author =       "Anonymous",
  title =        "Telcos wake up to phreaking menace",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--595",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:FWP,
  author =       "Anonymous",
  title =        "Firms warned not to play E-mail `big brother' role",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "595--596",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820203",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:CEC,
  author =       "Anonymous",
  title =        "{Canada}'s eavesdropping on citizens, ex-spy says",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "596--596",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820215",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:MHP,
  author =       "Anonymous",
  title =        "{Millennium} hackers plan City assault",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "596--596",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:MPR,
  author =       "Anonymous",
  title =        "E-mail privacy rule",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "596--596",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820239",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:BFCb,
  author =       "Anonymous",
  title =        "Businesses fail to comply with data protection
                 principles",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "596--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820240",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:BOE,
  author =       "Anonymous",
  title =        "Back Orifice --- an excuse to legalize hacking?",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "597--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820288",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:CAC,
  author =       "Anonymous",
  title =        "{Clinton} administration calls for network
                 monitoring",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "597--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820276",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:DGP,
  author =       "Anonymous",
  title =        "Don't go proprietary, crypto expert urges",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "597--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489982029X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:TTH,
  author =       "Anonymous",
  title =        "Termination threat hangs over thin client software",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "597--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820264",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:VWA,
  author =       "Anonymous",
  title =        "Virus is wrapped and all ready for {Christmas} day",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "597--597",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:AEH,
  author =       "Anonymous",
  title =        "{ADSL} enables hacker access",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489982032X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:GSH,
  author =       "Anonymous",
  title =        "Government sites hacked due to {NATO}'s bombing",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820306",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:HSF,
  author =       "Anonymous",
  title =        "Hotmail `slow to fix flaw in security'",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820331",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:TSS,
  author =       "Anonymous",
  title =        "Taxman says sorry for year 2000 blunder",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820343",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:UBC,
  author =       "Anonymous",
  title =        "{US} backs cyber-crime Bill",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820355",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ULU,
  author =       "Anonymous",
  title =        "Users lose under new law",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "598--598",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Cg,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "599--600",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820367",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:CPA,
  author =       "Anonymous",
  title =        "{Compsec '99} paper abstracts",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "601--607",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:CEa,
  author =       "Anonymous",
  title =        "{Compsec '99} exhibitors",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "608--616",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820380",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:RP,
  author =       "Anonymous",
  title =        "Refereed papers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "617--618",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peyravian:1999:GUB,
  author =       "Mohammad Peyravian and Stephen M. Matyas and Allen
                 Roginsky and Nev Zunic",
  title =        "Generating user-based cryptographic keys and random
                 numbers",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "619--626",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820409",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spinellis:1999:TTP,
  author =       "Diomidis Spinellis and Stefanos Gritzalis and John
                 Iliadis and Dimitris Gritzalis and Sokratis Katsikas",
  title =        "Trusted third party services for deploying secure
                 telemedical applications over the {WWW}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "627--639",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820410",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCg,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "640--642",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899820422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Pg,
  author =       "Anonymous",
  title =        "Pages 550--642 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "7",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:E,
  author =       "Anonymous",
  title =        "From the editor",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "644--645",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907812",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:SV,
  author =       "Anonymous",
  title =        "Security view",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "646--659",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinde:1999:SSN,
  author =       "Stephen Hinde",
  title =        "Step into a secure new world --- {Compsec '99}
                 report",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "660--669",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Richards:1999:NBI,
  author =       "Kevin Richards",
  title =        "Network based intrusion detection: a review of
                 technologies",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "671--682",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740489980131X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Collins:1999:TCPb,
  author =       "Michael Collins",
  title =        "Telecommunications crime --- {Part 2}",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "683--692",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nosworthy:1999:YCP,
  author =       "Julie D. Nosworthy",
  title =        "{Y2K} contingency planning: Taking {BCM} into the
                 21-st century",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "693--704",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ARA,
  author =       "Anonymous",
  title =        "Abstracts of recent articles and literature",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "705--710",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Ch,
  author =       "Anonymous",
  title =        "Calendar",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "711--712",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907824",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:IBRf,
  author =       "Anonymous",
  title =        "International board of referees",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "713--714",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dowland:1999:CCA,
  author =       "P. S. Dowland and S. M. Furnell and H. M. Illingworth
                 and P. L. Reynolds",
  title =        "Computer crime and abuse: a survey of public attitudes
                 and awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "715--726",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:1999:PAS,
  author =       "Wen-Her Yang and Shiuh-Pyng Shieh",
  title =        "Password authentication schemes with smart cards",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "727--733",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899801369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:ITCh,
  author =       "Anonymous",
  title =        "{IFIP} technical committee 11",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "734--736",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404899907848",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:1999:Ph,
  author =       "Anonymous",
  title =        "Pages 644--736 (1999)",
  journal =      j-COMPUT-SECUR,
  volume =       "18",
  number =       "8",
  pages =        "??--??",
  month =        "????",
  year =         "1999",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:45:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur1990.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}