scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Security in 1986"



Journal ArticleDOI
TL;DR: A survey of methods and technologies available today to enhance network security is presented in this article, including information security strategy, computer security and its relation to network security, data communications security, and data encryption.

23 citations


Journal ArticleDOI
TL;DR: Girling's strategy for one-time keywords for authentication forwarding is combined with a proxy login mechanism to obtain a reliable method for network authentication that does not depend on the transmission of passwords.

23 citations



Journal ArticleDOI
TL;DR: The various data security features supported by the relational database language SQL are described, which cover the following aspects: user authorities, integrity, recovery and locking.

18 citations


Journal ArticleDOI
TL;DR: This paper addresses two issues of concern to those responsible for ensuring that the safeguards incorporated into application software are adequate and appropriate.

15 citations


Journal ArticleDOI
TL;DR: The problem of authenticating messages in applications in which senders and receivers communicate over unprotected channels is considered, and new techniques from the area of public-key cryptography are devised to determine that messages indeed originate at the claimed source and have not been tampered with on the way.

14 citations


Journal ArticleDOI
TL;DR: A chosen-plaintext attack was used to break the encoding; the encryption method could be derived easily from the enciphering of carefully chosen plaintext programs and a pair of MBASIC programs able to decrypt a protected program for any interpreter was developed.

10 citations


Journal ArticleDOI
TL;DR: This paper examines the exposure of an information system to an attack by a ''Trojan Horse'' and trapdoors and outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks.

9 citations


Journal ArticleDOI
Cees J. A. Jansen1
TL;DR: The key storage capacity of a terminal is determined and a scheme for reducing this storage capacity is presented and the consequences of this reduction scheme are discussed and illustrated by an example.

7 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present directions for exploring these problems further: a societal risk analysis, a focus on one or more critical computer systems, and the formation of interdisciplinary discussion forums.

Journal ArticleDOI
TL;DR: There is a need for intensive training programmes in this area, following an interdisciplinary team approach modelled on the MBA Degree, with an international clearing house for the creation and exchange of case studies for training Computer Crime Investigators.

Journal ArticleDOI
Willis H. Ware1
TL;DR: The future world will be so tightly stitched together by its information threads that a combination of approaches to protecting privacy will be essential.

Journal ArticleDOI
TL;DR: This paper describes representative functions that security modules perform, the benefits to be derived when security modules are deployed, and some current and future applications of this new technology.

Journal ArticleDOI
TL;DR: This report presents a management overview of the problems and issues related -to software reuse, and provides a description of software reusability and its scope.

Journal ArticleDOI
TL;DR: The author presents some new concepts which will enable the software developers to measure not only the degree of security being built into the software, but also its direct impact on reliability.


Journal ArticleDOI
TL;DR: This article presents an accountant's views of selected issues related to six internal control categories: transmission controls, access controls, file management, encryption, activity monitoring, and applications controls.



Journal ArticleDOI
TL;DR: A series of tests over security and audit personnel demands that senior management know what they can expect from signatures from more than 350 subjects found the error their audit department and have a way of derates in the most recent test.

Journal ArticleDOI
TL;DR: The contents of such a course are suggested, with reference to existing courses conducted by the FBI and RCMP, where people from different disciplines, emerge with a good knowledge of each others' capabilities.


Journal ArticleDOI
TL;DR: This paper spells out the risks run by computing centres under MVS installing home-grown user SuperVisor Calls, and a set of design requirements is formulated with which these user SVCs must comply if they are to be considered secure.



Journal ArticleDOI
TL;DR: The problems created by the facilities of Electronic Funds Transfer are considered in relation to the role of auditors seeking to ensure that correct and secure operations occur when a computer takes over major record processing activities within an organisation.

Journal ArticleDOI
TL;DR: It is argued in this paper that security is by no means an entirely technical issue and the human factors affecting data security issues should be reflected in the design of a system and its management.

Journal ArticleDOI
TL;DR: This paper suggests that audit management utilize decision support systems, management information systems and management science models to identify and project the deterioration of controls that can occur.