Journal: Computers & Security

Volume 15, Issue 6

458 -- 469Harold Joseph Highland. Random bits & bytes
471 -- 476Robert L. Frank. Security issues in the virtual corporation
477 -- 485Ken Lindup. The role of information security in corporate governance
486 -- 498Gerald L. Kovacich. Establishing a network security programme
499 -- 500Edwin B. Heinlein. Year 2000 - A real is security issue
501 -- 506John Sherwood. SALSA: A method for developing the enterprise security architecture and strategy
507 -- 514Jim Press. Object oriented cryptographic facility design: Export considerations
525 -- 536Vijay Varadharajan, Claudio Calvelli. Extending the schematic protection model - II. Revocation
537 -- 544Sung-Ming Yen. Cryptanalysis and repair of the multi-verifier signature with verifier specification