Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Computers and Security
Elsevier Advanced Technology Publications
 
   
 
Options:
 
  1-10 of 14 reviews Date Reviewed 
  A formal proximity model for RBAC systems
Gupta A., Kirkpatrick M., Bertino E. Computers and Security 4152-67, 2014.  Type: Article

Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance...

Aug 22 2014
  Consistency and enforcement of access rules in cooperative data sharing environment
Le M., Kant K., Jajodia S. Computers and Security 413-18, 2014.  Type: Article

Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating...

Jul 15 2014
  Crypto management made manageable--demands on crypto equipment design
Fåk V. Computers and Security 6(1): 36-40, 1987.  Type: Article

Increased security consciousness in most large organizations has brought on an increase in the use of encryption; and crypto management is, indeed, possible in a normal computer environment. In some instances, such as protecting files ...

Feb 1 1988
  A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986.  Type: Article

This short paper contains two sections. The first suggests that a callback modem can be replaced by a program in which a caller can specify the phone number to be called. This seems to defeat the very purpose of callback modems, howeve...

Mar 1 1987
  On the key storage requirements for secure terminals
Jansen C. Computers and Security 5(2): 145-149, 1986.  Type: Article

The author of this paper is employed by Philips Usfa in the development of cryptographic equipment. As a consequence, he is appropriately equipped to present some deliberations on practical encryption applications....

Mar 1 1987
  Data security in a relational database environment
van der Lans R. Computers and Security 5(2): 128-134, 1986.  Type: Article

The paper provides an introduction to the data security features offered by the relational database language SQL: checking, granting, passing, and revoking authorities, as well as recovery and looking....

Feb 1 1987
  Risk management--a key to security in the electronic funds transfer system
Richards R., Yestingsmeier J. Computers and Security 5(2): 135-140, 1986.  Type: Article

This is a short summary which mentions once almost every topic related to EFTS security management. Since so many topics are mentioned in so few pages (including insurance, consumer protection, auditing, etc.), none can be cover...

Jan 1 1987
  Microcomputer security: data protection techniques
Highland H. (ed) Computers and Security 4(2): 123-134, 1985.  Type: Article

This paper provides a shallow look into the world of data security on microcomputers. The author touches on seven areas of data security, giving a brief description of each area, as well as a description of the commercially available h...

Apr 1 1986
  Incorporating access control in forms systems
Yeo G. Computers and Security 4(2): 109-122, 1985.  Type: Article

Many current computer systems work on the basis of forms for input and output. Many of these systems have elaborate editing languages to allow the programmer to specify the structure of the form, and the format of the fields. The autho...

Feb 1 1986
  Data security and confidentiality in Europe
Chamoux J. Computers and Security 4(3): 207-210, 1985.  Type: Article

This brief paper is presumably a critical review of the findings of a European Economic Community study of data security and confidentiality. However, the author does not cite any report or document containing the findings. According t...

Feb 1 1986
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy