Journal: Communications of the ACM

Volume 39, Issue 3

17 -- 20Roy Rada. ISO 9000 Reflects the Best in Standards
21 -- 30Randall Davis, Pamela Samuelson, Mitchell Kapor, Jerome Reichman. A New View of Intellectual Property and Software
32 -- 33Ravi Ganesan. How to Use Key Escrow (Introduction to the Special Section)
34 -- 40Dorothy E. Denning, Dennis K. Branstad. A Taxonomy for Key Escrow Encryption Systems
41 -- 47Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson. Commercial Key Recovery
48 -- 53David Paul Maher. Crypto Backup and Key Escrow
55 -- 60Ravi Ganesan. The Yaksha Security System
61 -- 68Frederick P. Brooks Jr.. The Computer Scientist as a Toolsmith II
69 -- 77A. T. Wood-Harper, Steve Corder, J. R. G. Wood, Heather Watson. How We Profess: The Ethical Systems Analyst
78 -- 84Anthony Ralston. The Demographics of Candidates for Faculty Positions in Computer Science
85 -- 97Guy E. Blelloch. Programming Parallel Algorithms
122 -- 0Robert N. Charette. Taking Responsibility for Our Risks