| 83 | -- | 0 | Harold Joseph Highland. In this issue.. |
| 84 | -- | 0 | Johan Essén. New member of the International Board of Editors |
| 85 | -- | 93 | Harold Joseph Highland. Electromagnetic radiation revisited |
| 101 | -- | 113 | Willis H. Ware. Emerging privacy issues |
| 114 | -- | 121 | Charles Cresson Wood, Howard M. Zeidler. Security modules: Potent information security system components |
| 122 | -- | 127 | L. Hoebeke. Computer security - Prevention: Lessons from the operation of a nuclear power plant |
| 128 | -- | 134 | Rick F. van der Lans. Data security in a relational database environment |
| 135 | -- | 140 | Roy Martin Richards Jr., Jan Yestingsmeier. Risk management - a key to security in the electronic funds transfer system |
| 141 | -- | 144 | Matt Bishop. A pauper's callback scheme |
| 145 | -- | 149 | Cees J. A. Jansen. On the key storage requirements for secure terminals |
| 167 | -- | 0 | June M. Power, Steve R. Wilbur. Authentication in a heterogeneous environment |
| 167 | -- | 0 | Willis H. Ware. Emerging privacy issues |
| 167 | -- | 0 | Viiveke Fåk. Software versus hardware encryption - Is there any difference today? |
| 167 | -- | 0 | Frederick G. Tompkins, Russel S. Rice. Intergrating security activities into the software development life cycle and the software quality assurance process |
| 167 | -- | 168 | T. K. Worthington, J. J. Chainer, J. D. Willford, S. C. Gunderson. IBM dynamic signature verification |
| 167 | -- | 0 | John M. Carroll, Helmut Jürgensen. Design of a secure relational data base |
| 168 | -- | 0 | John G. Beatson. Development and organization of the audit and security functions |
| 168 | -- | 0 | Roger T. Doswell. The audit, control and security of the project life cycle - Pre-implementation stage |
| 168 | -- | 0 | Peter P. C. H. Kingston, Martin Goulbourn. Security for small business computers |
| 168 | -- | 169 | Philip M. Stanley. Educating computer crime investigators |
| 168 | -- | 0 | William T. Tener. Decision support systems - A necessity for effective auditing of controls |
| 168 | -- | 0 | Ivan Ekerbrink. Security of electronic transactions |
| 168 | -- | 0 | Hans-Jürgen Kugler. Concepts of protection in the IFIP WG 2.7 reference model for command and response languages |
| 169 | -- | 0 | Gerald E. Murine. Producing reliable, secure software |
| 169 | -- | 0 | Donald W. Davies. How to use the DES safely |
| 169 | -- | 0 | Charles Cresson Wood. Establishing technical systems security standards at a large multinational bank |