The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Computers at Risk: Safe Computing in the Information Age
Anthes, Gary, H. 1989a. "ACC tunes in to illicit hacking activity—firm ferrets out threats," Federal Computer Week, September 18, pp. 1, 53.
Anthes Gary, H. 1989b. "U.S. software experts track British standards," Federal Computer Week, September 18, pp. 3, 8.
Anthes, Gary H. 1989c. "DARPA response team spawns private spinoffs," Federal Computer Week, December 11.
Anthes, Gary H. 1989d. "Vendors skirt NCSC evaluations: Security system testing faulted for length and cost in process," Federal Computer Week, December 11, p. 4.
Anthes, Gary H. 1990a. "NIST combats confusion on encryption standard," Federal Computer Week, January 29, p. 7.
Anthes, Gary H. 1990b. "Oracle, AF to build secure data base system: Project will build operational relational DBMS to meet Al trust," Federal Computer Week, March 12.
Armed Forces Communications and Electronics Association (AFCEA). 1989. Information Security Study, Fairfax, Va., April.
Bailey, David. 1984. "Attacks on computers: Congressional hearings and pending legislation," Proceedings of the 1984 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 29–May 2, pp. 180–186.
Baldwin, Robert W. 1988. Rule Based Analysis of Computer Security, Technical Report 401, Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, Mass., March.
Beatson, Jim. 1989. "Is America ready to 'fly by wire'?" Washington Post, April 2, p. C3.
Becker, L. G. 1987. An Assessment of Resource Centers and Future Requirements for Information Security Technology, prepared for the National Security Agency, Fort Meade, Md., September.
Bell, Elliott D. 1983. "Secure computer systems: A retrospective," Proceedings of the 1983 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 25–27, pp. 161–162.
Bell, Elliot D. 1988. "Concerning modeling of computer security," Proceedings of the 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 18–21, pp. 8–13.
Bell, Elliott D. and L. J. La Padula. 1976. Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75-306, MITRE Corp., Bedford, Mass., March.
Beresford, Dennis R., et al. 1988. "What is the FASB's role, and how well is it performing?" Financial Executive, September/October, pp. 20–26.
Berman, Jerry and Janlori Goldman. 1989. A Federal Right of Information Privacy: The Need for Reform, American Civil Liberties Union/Computer Professionals for Social Responsibility, Washington, D.C.
Berton, Lee. 1989. "Audit firms are hit by more investor suits for not finding fraud," The Wall Street Journal, January 24, pp. A1, A12.
Betts, Mitch. 1989. "Senate takes tentative look at virus legislation," Computerworld, May 22.
Biba, K. J. 1975. Integrity Considerations for Secure Computer Systems , Report MTR 3153, MITRE Corp., Bedford, Mass., June.
Birrell, Andrew D., B. W. Lampson, R. M. Needham, and M. D. Schroeder. 1986. "A global authentication service without global trust," Proceedings of the 1986 IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif., April 7–9, pp. 223–230.
BloomBecker, Jay, Esq. (Ed). 1988. Introduction To Computer Crime, 2nd ed., National Center for Computer Crime Data, Los Angeles, Calif.
Bloomfield, R. E. 1990. SafeIT: The Safety of Programmable Electronic Systems, a government consultation document on activities to promote the safety of computer controlled