Journal: Computers & Security

Volume 2, Issue 3

213 -- 0Harold Joseph Highland. Editorial
218 -- 222Jerome Lobel. The state-of-the-art in computer security
223 -- 229Charles Cresson Wood. Enhancing information security with the information resource management approach
230 -- 236John M. Carroll. Decision support for risk analysis
237 -- 241Brian G. P. Fry, William F. Main. A conceptual methodology for evaluating security requirements for data assets
242 -- 247Harvey S. Koch. Implementing an integrated test facility audit using differential files
248 -- 255H. Rex Hartson. Teaching protection in computing: A research-oriented graduate course
256 -- 260Jan H. P. Eloff. Selection process for security packages
261 -- 267F. Ayoub. The design of complete encryption networks using cryptographically equivalent permutations
268 -- 274Arthur Sorkin. Requirements for a secure terminal switch
275 -- 280Norman R. Bottom Jr.. An informational theory of security