|
Journals in DBLP
- Harold Joseph Highland
Random bits & bytes. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:622-627 [Journal]
- Jon Ølnes
Development of security policies. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:628-636 [Journal]
- Ken Lindup
The cyberpunk age. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:637-645 [Journal]
- Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe
Security evaluation in information technology standards. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:647-650 [Journal]
- Imtiaz Mohammed, David M. Dilts
Design for dynamic user-role-based security. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:661-671 [Journal]
- Sebastiaan H. von Solms, Isak van der Merwe
The management of computer security profiles using a role-oriented approach. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:673-680 [Journal]
- Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu
Access control with binary keys. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:681-686 [Journal]
- Helen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli
A computer package for measuring the strength of encryption algorithms. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:8, pp:687-697 [Journal]
|