Journal: Computers & Security

Volume 8, Issue 6

458 -- 459Harold Joseph Highland. From the editor
460 -- 478Harold Joseph Highland. Random bits & bytes
479 -- 485Phillip E. Gardner. Evaluation of five risk assessment programs
487 -- 492Belden Menkus. The employee s role in protecting information assets
495 -- 505C. L. Harrold. An introduction to the SMITE approach to secure computing
507 -- 516Raju Ramaswamy. Placement of data integrity security services in open systems interconnection architecture
517 -- 533Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham. SODA: A secure object-oriented database system
537 -- 546Esther H. Highland. Abstracts of recent articles and literature