Publisher's Synopsis
Fifty-five contributions discuss computer security and ways of achieving it, describing advances in technology and methodology, and presenting case studies. Among the techniques considered are cryptography, positive personal identification, access control, smart cards, audit methods, and risk analys