Select All | Select None
Login failed. Please try again.
Forgot your password?
Log in with Facebook
Log in with Google
You can now keep track of new articles from ACM SIGSAC Review on your personalized homepage!
WE LIVE IN AN "Information Age." A new infrastructure, a pervasive network of electronic processing and telecommunication, is impinging on the millions of business, governmental, educational and personal enterprises in the world and the interactions among them.
Dr. Daniel Guinier presented a proposal for a computer virus database in the Fall 1989 edition of SIGSAC (Volume 7, Number 3). In this article a form of virus classification is presented that has been used some success for nearly two years. Furthermore, future developements in the field of virus...
Integrity is frequently a highly critical concern for computing systems, especially those which deal with financial concerns and in areas with high legal liability exposure in the event of loss or corruption of data. Systems for which data integrity is a high concern must consider system...
Recent articles and papers in the SIGSAC Review and at computer security conferences have discussed the need for top management directed computer security charters and programs. While a good first step, what is needed is both the security charters as well as an active centralized security...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.