Sign In

Communications of the ACM

Table of Contents


1995 observations on supercomputing alternatives: did the MPP bandwagon lead to a cul-de-sac?


ISO 9000 reflects the best in standards


A new view of intellectual property and software


How to use key escrow


A taxonomy for key escrow encryption systems


Commercial key recovery


Crypto backup and key escrow


The Yaksha security system


The computer scientist as toolsmith II


How we profess: the ethical systems analyst


The demographics of candidates for faculty positions in computer science


Programming parallel algorithms


Report on NIIP


Taking responsibility for our risks