Journal: Information Systems Security

Volume 3, Issue 4

3 -- 4Donn B. Parker. From the Editor
5 -- 10Harry B. DeMaio. Information Protection and Business Process Reengineering
11 -- 15Wayne Madsen. Information Police on the Internet
16 -- 20Donn B. Parker. Security Accountability in Job Performance
21 -- 25Gary Benesko, Philip Teplitzky. EDI Integrity Controls
27 -- 29Michael I. Sobol. Products Used to Secure Networked Macintosh Computers
30 -- 33William Hugh Murray. Modern Cryptography
34 -- 41Ed Sawicki. Securing NetWare Against Trojan Horse Attacks
42 -- 51William M. Hancock. Dial-Up Modem Protection Schemes
52 -- 58Kirby G. Dickson. Information Anarchy and the Control of Cryptography
59 -- 68Mary Ann Davidson. Security in an Oracle Data Base Environment

Volume 3, Issue 3

3 -- 4Donn B. Parker. From the Editor
5 -- 10Harry B. DeMaio. Information Security: Behind the Telecommuting Power Curve
11 -- 15Wayne Madsen. International ITSEC Standards: INTEL Isn't Inside
16 -- 22Donn B. Parker. Update on Cryptography: Who Will Keep the Keys?
23 -- 26Ralph Spencer Poore. Remembered Secrets: Multisession Systems, LANs, and Other Hiding Places
27 -- 31Michael I. Sobol. Data Encryption
32 -- 36Robert R. Moeller. Communications Security, LAN Security, and Viruses
37 -- 44Dan G. Erwin. The Thirty-Minute Risk Analysis
45 -- 52Joseph Piazza. A Multilevel Strategy for Combatting Viruses
53 -- 63Sandra M. Lambert. Exploiting the Power of Message Authentication Codes
64 -- 71James E. Molini. The New Frontier: Clieht/Server and Agent Technology

Volume 3, Issue 2

3 -- 0Donn B. Parker. From the Editor
5 -- 9Harry B. DeMaio. Groupware - Hazardous to Your Health?
10 -- 14Wayne Madsen. Net-Jacking on the National Information Highway
15 -- 19Gary Benesko, Philip Teplitzky. Security and Controls for EDI
20 -- 23Geoffrey W. Turner. Cryptography: Beyond Computer Crime
24 -- 29Michael I. Sobol. Anti-Virus Software
30 -- 35William Hugh Murray. Five Views of the Common Body of Knowledge
36 -- 44Ray Kaplan, Glen Zorn, Joe Kovara. Planning and Implementing Kerberos for Large Distributed Systems: Part 2
47 -- 55Robert E. Smith. Proactive Solutions for Multinetwork Security
56 -- 64Martha Stansell-Gamm. Responding to Computer Crime: A Security Practitioner's Guide
65 -- 74Ralph Spencer Poore. Reference Monitor Technology: Watching Your Every Keystroke
75 -- 86Donn B. Parker. A Guide to Selecting and Implementing Security Controls

Volume 3, Issue 1

3 -- 4Donn B. Parker. From the Editor
5 -- 10Harry B. DeMaio. Information Protection Standards in the 1990s: Part 2
11 -- 16Wayne Madsen. Protecting Business Secrets in an EDI/CALS Environment
17 -- 22Donn B. Parker. Demonstrating the Elements of Information Security with Loss Scenarios
23 -- 24Gordon Fielding. Electronic Eavesdropping: Solutions in Search of a Problem
25 -- 30Michael I. Sobol. Products for Media Backup and Recovery
31 -- 34Robert R. Moeller. Two New Books on UNIX and Data Base Security
35 -- 44Ray Kaplan, Joe Kovara, Glen Zorn. Planning and Implementing Kerberos for Large Distributed Systems Part 1
45 -- 56Larry Runge. Security and Data Integrity in a Client-Server Environment
57 -- 70Addison Fischer. Public Key Cryptography in Action
71 -- 81Micki Krause. Writing a Communications Security Policy