Journal: Computers & Security

Volume 10, Issue 5

384 -- 397Harold Joseph Highland. Random bits & bytes
399 -- 404Charles Cresson Wood. Using information security to achieve competitive advantage
405 -- 409Belden Menkus. Hackers : Know the adversary
413 -- 427Ravi S. Sandhu, Sushil Jajodia. Integrity principles and mechanisms in database management systems
429 -- 441Jan Kruys. Progress in secure distributed systems