Journal: Information Systems Security

Volume 2, Issue 3

1 -- 4Donn B. Parker. From the Editor
5 -- 9Harry B. DeMaio. A Situational Approach to Integrity
10 -- 12James Bidzos. The Clipper Chip Controversy
13 -- 17Donn B. Parker. Cryptographic Threat Analysis
18 -- 22Ralph Spencer Poore. Security in Open Networks: A Contradiction in Terms?
23 -- 27Clive Blatchford. The Fight for International Security Solutions
28 -- 33Michael I. Sobol. Telecommunications Security Products and Services
34 -- 37Robert R. Moeller. Novel Approaches to Contingency Planning and Security
38 -- 52Peter D. Goldis. Comparing MVS and UNIX Security: The View from the Glass House
53 -- 62Ray Kaplan, Joe Kovara. Psychological Subversion of Information Systems
63 -- 72Judy K. Bell. Protecting Communications Before Disaster Strikes
73 -- 85Andrew J. Logan. Developing the Office Recovery Plan