Journal: Information Systems Security

Volume 2, Issue 3

1 -- 4Donn B. Parker. From the Editor
5 -- 9Harry B. DeMaio. A Situational Approach to Integrity
10 -- 12James Bidzos. The Clipper Chip Controversy
13 -- 17Donn B. Parker. Cryptographic Threat Analysis
18 -- 22Ralph Spencer Poore. Security in Open Networks: A Contradiction in Terms?
23 -- 27Clive Blatchford. The Fight for International Security Solutions
28 -- 33Michael I. Sobol. Telecommunications Security Products and Services
34 -- 37Robert R. Moeller. Novel Approaches to Contingency Planning and Security
38 -- 52Peter D. Goldis. Comparing MVS and UNIX Security: The View from the Glass House
53 -- 62Ray Kaplan, Joe Kovara. Psychological Subversion of Information Systems
63 -- 72Judy K. Bell. Protecting Communications Before Disaster Strikes
73 -- 85Andrew J. Logan. Developing the Office Recovery Plan

Volume 2, Issue 2

3 -- 4Donn B. Parker. From the Editor
5 -- 9Harry B. DeMaio. Taking Fax Security Seriously
10 -- 14Donn B. Parker. A Comprehensive List of Threats To Information
15 -- 18Philip Teplitzky. Security in a Client/Server Environment
19 -- 23Cole Emerson. Facing the Challenge of Vital Records Recovery
24 -- 28Michael I. Sobol. An Overview of Encryption Products
29 -- 32William Hugh Murray. Surveys of Information Security
33 -- 42Allen B. Lum. Securing UNIX-Based Networks
43 -- 50Robert P. Campbell. Hands-On Penetration Testing of Systems Controls
51 -- 62Gilbert W. Joseph, Terry J. Engle. Controlling the Data Base Administrator
63 -- 71David S. Bauer. Cost-Effective Development of Secure Applications

Volume 2, Issue 1

3 -- 4Donn B. Parker. From the Editor
5 -- 8Harry B. DeMaio. Reevaluating Information Ownership
9 -- 12Chris McDonald. Does Anyone Remember?
13 -- 17Donn B. Parker. Confidentiality of Information and Personal Privacy
18 -- 21Ralph Spencer Poore. Is Network Security a Contradiction in Terms?
22 -- 24William List. Is Error Detection a Security Concern?
25 -- 29Michael I. Sobol. Macintosh Security and Data Integrity Products
30 -- 32Robert R. Moeller. Network Security
33 -- 39Peter D. Goldis. MVS Integrity: The Intruder's Point of View
40 -- 47Richard Baskerville. Information Security: Adapting to Survive
48 -- 56Cheryl W. Helsing. A Customer-Driven Approach to Business Resumption Planning
57 -- 72Ravi S. Sandhu, Sushil Jajodia. Limitations of Relational Data Base Access Controls