Issue No. 05 - September-October (2003 vol. 1)
Michael Caloyannides , Mitretek Systems
<p>Protecting the confidentiality of computer usage involves far more than merely protecting the content of individual files. Going to extremes will not protect a computer from every threat, but it's nearly as close as we can get.</p>
M. Caloyannides, "Keeping Offline Computer Usage Private," in IEEE Security & Privacy, vol. 1, no. , pp. 93-95, 2003.