Journal: Computers & Security

Volume 12, Issue 7

612 -- 622Harold Joseph Highland. Random bits & bytes
623 -- 626Martin Plant. Getting management buy-in to IT security
627 -- 628Edwin B. Heinlein. I worked with Murphy
629 -- 633Brian S. Collins, Steve Mathews. Securing your business process
634 -- 639Harold Joseph Highland. A view of information security tomorrow
640 -- 645William J. Caelli, Ian G. Graham, Luke O Connor. Cryptographic Application Programming Interfaces (APIs)
657 -- 662Mohammad S. Obaidat. A methodology for improving computer access security
663 -- 678Charles Cresson Wood. Principles of secure information systems design with groupware examples
679 -- 689Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams. Report of an integrity research study group