Abstract is missing.
- Modeling the "multipolicy machine"David Elliott Bell. 2-9 [doi]
- Messages, communication, information security and valueJohn Dobson. 10-19 [doi]
- New email security infrastructureMartin Ferris. 20-27 [doi]
- "HIS-Treck - the next generation": an introduction to future hospital information systemsThomas L. Lincoln. 28-31 [doi]
- Healthcare information architecture: elements of a new paradigmDaniel J. Essin, Thomas L. Lincoln. 32-41 [doi]
- Anomaly detection: a soft computing approachT. Y. Lin. 44-53 [doi]
- Fuzzy sets and secure computer systemsSergei Ovchinnikov. 54-62 [doi]
- Formal semantics of confidentiality in multilevel logic databasesAdrian Spalka. 64-73 [doi]
- What is a secret - and - what does that have to do with computer security?Ruth Nelson. 74-79 [doi]
- A new approach to security system developmentSilvana Castano, Giancarlo Martella, Pierangela Samarati. 82-88 [doi]
- Providing non-hierarchical security through interface mechanismsDeborah Hamilton. 89-95 [doi]
- Designing encryption algorithms for real peopleBruce Schneier. 98-101 [doi]
- A discretionary access control model with temporal authorizationsElisa Bertino, Claudio Bettini, Pierangela Samarati. 102-107 [doi]
- Versatile integrity and security environment (VISE) for computer systemsCharles G. Limoges, Ruth R. Nelson, John H. Heimann, David S. Becker. 109-118 [doi]