Journal: Computers & Security

Volume 16, Issue 6

452 -- 453. From the editor
455 -- 458Gerald L. Kovacich. ISSO career development
469 -- 479Thomas Finne. Information security implemented in: The theory on stock market efficiency, Markowitz s portfolio theory and porter s value chain
481 -- 506Rosario Gennaro, Paul A. Karger, Stephen M. Matyas, Mohammad Peyravian, Allen Roginsky, David Safford, Michael Willett, Nevenko Zunic. Two-phase cryptographic key recovery system
543 -- 549Les Labuschagne, Jan H. P. Eloff. Improved system-access control using complementary technologies
551 -- 563Simon N. Foley. Building Chinese walls in standard unix:::TM:::