17 | -- | 20 | Roy Rada. ISO 9000 Reflects the Best in Standards |
21 | -- | 30 | Randall Davis, Pamela Samuelson, Mitchell Kapor, Jerome Reichman. A New View of Intellectual Property and Software |
32 | -- | 33 | Ravi Ganesan. How to Use Key Escrow (Introduction to the Special Section) |
34 | -- | 40 | Dorothy E. Denning, Dennis K. Branstad. A Taxonomy for Key Escrow Encryption Systems |
41 | -- | 47 | Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson. Commercial Key Recovery |
48 | -- | 53 | David Paul Maher. Crypto Backup and Key Escrow |
55 | -- | 60 | Ravi Ganesan. The Yaksha Security System |
61 | -- | 68 | Frederick P. Brooks Jr.. The Computer Scientist as a Toolsmith II |
69 | -- | 77 | A. T. Wood-Harper, Steve Corder, J. R. G. Wood, Heather Watson. How We Profess: The Ethical Systems Analyst |
78 | -- | 84 | Anthony Ralston. The Demographics of Candidates for Faculty Positions in Computer Science |
85 | -- | 97 | Guy E. Blelloch. Programming Parallel Algorithms |
122 | -- | 0 | Robert N. Charette. Taking Responsibility for Our Risks |