Journal: Computers & Security

Volume 8, Issue 3

176 -- 177Harold Joseph Highland. From the editor
178 -- 188Harold Joseph Highland. Random bits & bytes
189 -- 199Charles Cresson Wood. Planning: A means to achieve data communications security
201 -- 205Belden Menkus. Physical security: Selecting an access control system
209 -- 221M. Shain. Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services global network
223 -- 227Thomas P. Keenan. Emerging vulnerabilities in office automation security
229 -- 245D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham. Prototyping to explore MLS/DBMS design
259 -- 269Esther H. Highland. Abstracts of recent articles and literature