Volume 10, Number 1, February 1991
: Predicate based polyinstantiation in multi-level secure DBMS.
: Electronic data interchange - security risk or not?
Volume 10, Number 2, April 1991
: Secure transfer of identity and privilege attributes in an open systems environment.
Volume 10, Number 3, May 1991
: How to begin dealing with computer security.
: Understanding IBM's CICS systems to improve security.
: The ABCs and Es of national computer security policies.
: Cybernetic analysis of the 12th U.S. National Computer Security Conference.
R. J. Allen
: Trusted ORACLE - multilevel secure data management for military computing.
Volume 10, Number 4, June 1991
: "Control" is fundamental to successful information security.
: A framework for the ethical analysis of information technologies.
: With MVS/ESA security labels towards B1.
: Computer fraud - The situation, detection and training.
, Sara F. Rushinek
: Data encryption features for computer hardware and software profitability: I/O ports, expansion slots, algorithms, cyphers and security.
Volume 10, Number 5, August 1991
: Progress in secure distributed systems.
Volume 10, Number 6, October 1991
: Disaster recovery: An unnecessary cost burden or an essential feature of any DP installation?
Volume 10, Number 7, November 1991
: European unification '92 impacts on information security.
: Design aspects of access control in a knowledge base system.
: Computer verification of human users' identity: A theoretical model and some evaluation criteria.
Volume 10, Number 8, December 1991
: Beyond RACF: Extending user authentication controls.