Volume 8, Number 1, February 1989
Lance J. Hoffman
: Risk analysis and computer security: Towards a theory at last.
Teresa F. Lunt
: Access control policies: Some unanswered questions.
, P. Grattan
: The role of classification of information in controlling data proliferation in end-user personal computer environment.
Volume 8, Number 2, April 1989
Anne E. Webster
: University of Delaware and the Pakistani computer virus.
: The computer virus situation is not encouraging.
: Controls in electronic funds transfer systems: A survey and synthesis.
: Models of practical defenses against computer viruses.
Volume 8, Number 3, May 1989
: Physical security: Selecting an access control system.
: Security in electronic funds transfer: Message integrity in money transfer and bond settlements through GE information services' global network.
Thomas P. Keenan
: Emerging vulnerabilities in office automation security.
Volume 8, Number 4, June 1989
: Computational aspects of computer viruses.
Lance J. Hoffman
: Smoking out the bad actors: Risk analysis in the age of the microcomputer.
Volume 8, Number 5, August 1989
: It's time to rethink data processing fire protection.
G. J. Bologna
: Twenty-two reasons why MIS subordinates don't measure up to their bosses' expectations.
Volume 8, Number 6, October 1989
: The employee's role in protecting information assets.
C. L. Harrold
: An introduction to the SMITE approach to secure computing.
: Placement of data integrity security services in open systems interconnection architecture.
Volume 8, Number 7, November 1989
, Christoph Ruland
: Optimized software implementations of the modular exponentiation on general purpose microprocessors.
Volume 8, Number 8, December 1989
: Security architecture for data transfer through TCP/IP protocols.