Volume 15, Number 1, 1996
From the editor. 2-3
: The new face of the virus threat.
: Achieving interoperable security services in open systems products.
Volume 15, Number 2, 1996
From the editor. 88-89
: A simple scheme to make passwords based on one-way functions much harder to crack.
Volume 15, Number 3, 1996
From the editor. 182-183
: Establishing web sites - legal issues and risks.
: Information protection for publishers.
: Enforcing legal ownership rights by an access control system.
: A conventional approach to secret balloting in computer networks.
Volume 15, Number 4, 1996
From the editor. 268-269
: The information security chain in a company.
Volume 15, Number 5, 1996
From the editor. 354-355
Volume 15, Number 6, 1996
From the editor. 456-457
: The role of information security in corporate governance.
: SALSA: A method for developing the enterprise security architecture and strategy.
: Object oriented cryptographic facility design: Export considerations.
: Cryptanalysis and repair of the multi-verifier signature with verifier specification.
Volume 15, Number 7, 1996
From the editor. 550-551
: Information warfare - Your company needs you!
Alan R. Krull
: GSSP (Generally-Accepted System Security Principles): A trip to Abilene?
Volume 15, Number 8, 1996
From the editor. 652-653
: Plugging the holes in host-based authentication.