Journal: Information Systems Security

Volume 13, Issue 1

2 -- 7Ken Dunham. Why SoBig Is So Big
8 -- 11Edward H. Freeman. Source Code Escrow
12 -- 17Nick Akerman. Protecting Yourself While Protecting Your Computer Data: Two Laws Make It More Important than Ever
18 -- 33Sumit Ghosh. The Nature of Cyber-attacks in the Future: A Position Paper
34 -- 43Candelaria Hernández-Goya, Pino Caballero-Gil. A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols
44 -- 50Thomas R. Peltier. Developing an Enterprisewide Policy Structure
51 -- 54Laurence J. Wolf. Preventing Failure: The Value of Performing a Single Point of Failure Analysis for Critical Applications and Systems