ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
ACM president's letter: a scientist's view of government control over scientific publication
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Computer Networks
Computer Fraud and Countermeasures
Computer Fraud and Countermeasures
ACM SIGOPS Operating Systems Review
Hi-index | 0.00 |
The wide use of personal computers and general access to telecommunications links have intensified the need for computer security, Security practices as discussed in this paper relate to protecting an organization's personal computers as physical propedy, protecting the organization's data and applications, and protecting the organization itself. These matters are discussed from the point of view of protection from the improper use of personal computers.