researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Issue
Volume
2
, Issue
3
1
--
4
Donn B. Parker
.
From the Editor
5
--
9
Harry B. DeMaio
.
A Situational Approach to Integrity
10
--
12
James Bidzos
.
The Clipper Chip Controversy
13
--
17
Donn B. Parker
.
Cryptographic Threat Analysis
18
--
22
Ralph Spencer Poore
.
Security in Open Networks: A Contradiction in Terms?
23
--
27
Clive Blatchford
.
The Fight for International Security Solutions
28
--
33
Michael I. Sobol
.
Telecommunications Security Products and Services
34
--
37
Robert R. Moeller
.
Novel Approaches to Contingency Planning and Security
38
--
52
Peter D. Goldis
.
Comparing MVS and UNIX Security: The View from the Glass House
53
--
62
Ray Kaplan
,
Joe Kovara
.
Psychological Subversion of Information Systems
63
--
72
Judy K. Bell
.
Protecting Communications Before Disaster Strikes
73
--
85
Andrew J. Logan
.
Developing the Office Recovery Plan