U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2076 through 2100 of 14279 matching records.
Publications Conference Proceedings December 20, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/12/20/property-verification-for-generic-access-control-models

Conference: 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08) Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for acces...

Publications Book Section December 19, 2008
https://csrc.nist.rip/publications/detail/book/2008/identity-enabled-privacy-policies

In: Identity & Policy: a Common Platform for a Pervasive Policy Paradigm (2008) Abstract: The primary motivation behind formulation of any privacy policy (policy in the context of this chapter refers to technical policies defined, specified and enforced within the relevant information systems) is to restrict the disclosure of identity of an individual (in certain locations, events or tra...

Publications NISTIR 7551 December 19, 2008
https://csrc.nist.rip/publications/detail/nistir/7551/final

Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ballot delivery, and voted ballot return. For each sta...

Publications Book Section December 19, 2008
https://csrc.nist.rip/publications/detail/book/2008/assurance-for-identity-enabled-authorization-policies

In: Identity & Policy: a Common Platform for a Pervasive Policy Paradigm (2008) Abstract: In this chapter, we describe an authorization policy validation framework. Authorization (or access control) policies, just like device policies and privacy policies, are an important class of policies for safeguarding enterprise resources. Specifically, authorization policies provide confidentialit...

Publications ITL Bulletin December 18, 2008
https://csrc.nist.rip/publications/detail/itl-bulletin/2008/12/guide-to-information-security-testing-and-assessment/final

Abstract: This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone and Murugiah Souppaya of NIST, and by...

Publications Conference Proceedings December 17, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/12/17/two-new-efficient-cca-secure-online-ciphers--mhcbc-and-mcbc

Conference: 9th International Conference on Cryptology in India (INDOCRYPT 2008) Abstract: Online ciphers are those ciphers whose ciphertexts can be computed in an online manner. HCBC1 and HCBC2 are two known examples of Hash Cipher Block Chaining online ciphers. HCBC1 is secure against chosen plaintext adversary (or called CPA-secure) whereas HCBC2 is secure against chosen ciphertext adv...

Publications Conference Proceedings November 30, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/11/30/security-challenges-in-seamless-mobility-how-to-handover-keys

Conference: 4th International ICST Conference on Wireless Interet (WICON 2008) Abstract: In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous access authentications. For a seamless handover,...

Publications Conference Proceedings November 13, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/11/13/access-control-policy-composition-for-resource-federation-networ

Conference: 2008 International Computer Symposium (ICS 2008) Abstract: The availability of global, pervasive information relies on seamless access to federated resources through sharing and trust between the participating members. However, most of the current architectures for federation networks are designed based on a centralized authorization management schema that...

Publications Conference Proceedings October 29, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/10/29/vulnerability-scoring-for-security-configuration-settings

Conference: 4th ACM Workshop on Quality of Protection (QoP'08) Abstract: The best-known vulnerability scoring standard, the Common Vulnerability Scoring System (CVSS), is designed to quantify the severity of security-related software flaw vulnerabilities. This paper describes our efforts to determine if CVSS could be adapted for use with a different type of vulnerability...

Publications SP 800-66 Rev. 1 October 23, 2008
https://csrc.nist.rip/publications/detail/sp/800-66/rev-1/final

Abstract: Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Security...

Publications ITL Bulletin October 15, 2008
https://csrc.nist.rip/publications/detail/itl-bulletin/2008/10/keeping-information-technology-it-system-servers-secure--a-ge/final

Abstract: This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-123, Guide to General Server Security: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone and Wayne Jansen of NIST and by Miles Tracy of Federal Reserve Info...

Publications Encyclopedia Entry October 7, 2008
https://csrc.nist.rip/publications/detail/book/2008/electronic-voting

In: Encyclopaedia Britannica Online (2009) Abstract: Definition of electronic voting. General discussion of issues related to the deployment of this technology in different countries.

Publications SP 800-115 September 30, 2008
https://csrc.nist.rip/publications/detail/sp/800-115/final

Abstract: The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for designing, implementing, and maintaining technical info...

Publications ITL Bulletin September 18, 2008
https://csrc.nist.rip/publications/detail/itl-bulletin/2008/09/using-performance-measurements-to-evaluate-and-strengthen-inform/final

Abstract: This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-55, Revision 1, Performance Measurement Guide for Information Security, by Elizabeth Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, and Will Robinson. The guide provides specific advice on devel...

Publications Journal Article September 1, 2008
https://csrc.nist.rip/publications/detail/journal-article/2008/refining-the-in-parameter-order-strategy-for-constructing-coveri

Journal: Journal of Research of the National Institute of Standards and Technology Abstract: Covering arrays are structures for well-representing extremely large input spaces and are used to efficiently implement blackbox testing for software and hardware. This paper proposes refinements over the In-Parameter-Order strategy (for arbitrary $t$). When constructing homogeneous-alphabet coverin...

Publications Conference Proceedings August 29, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/08/29/shortest-linear-straight-line-program-for-computing-linear-forms

Conference: 33rd International Symposium, MFCS 2008 Abstract: We study the complexity of the Shortest Linear Program (SLP) problem, which is to the number of linear operations necessary to compute a set of linear forms. SLP is shown to be NP-hard. Furthermore, a special case of the corresponding decision problem is shown to be Max SNP-Complete. Algorithms prod...

Publications NISTIR 7516 August 27, 2008
https://csrc.nist.rip/publications/detail/nistir/7516/final

Abstract: Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes used by forensic investigators to recover d...

Publications Conference Paper August 4, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/08/04/evidence-based-good-enough-and-open

Conference: Third Workshop on Security Metrics (Metricon 3.0) Abstract: One of the holy grail questions in computer security is how secure are my organization systems? This paper describes our new approach to answering this question. This approach is distinguished from previous efforts in three ways: 1) uses evidence-based security decision-making, 2) produces good enou...

Publications SP 800-60 Vol. 1 Rev. 1 August 1, 2008
https://csrc.nist.rip/publications/detail/sp/800-60/vol-1-rev-1/final

Abstract: Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintained by or on behalf of each agency based on the obj...

Publications SP 800-60 Vol. 2 Rev. 1 August 1, 2008
https://csrc.nist.rip/publications/detail/sp/800-60/vol-2-rev-1/final

Abstract: Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintained by or on behalf of each agency based on the obj...

Publications SP 800-123 July 25, 2008
https://csrc.nist.rip/publications/detail/sp/800-123/final

Abstract: The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The document discusses the need to secure servers and provid...

Publications Conference Proceedings July 24, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/07/24/forensic-protocol-filtering-of-phone-managers

Conference: 2008 International Conference on Security and Management (SAM 2008) Abstract: Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic fil...

Publications ITL Bulletin July 23, 2008
https://csrc.nist.rip/publications/detail/itl-bulletin/2008/07/guidelines-on-implementing-a-secure-sockets-layer-ssl-virtual-/final

Abstract: Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or more VPN devices to which users connect using their Web browsers. The traffic between the Web browser and SSL VPN device is encrypted with...

Publications Conference Proceedings July 21, 2008
https://csrc.nist.rip/publications/detail/conference-paper/2008/07/21/web-services-security-techniques-and-challenges-extended-abstr

Conference: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security Abstract: Web services-based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web services security, several research problems must be solved to make secure Web services a reality. This talk will present...

Publications SP 800-55 Rev. 1 July 16, 2008
https://csrc.nist.rip/publications/detail/sp/800-55/rev-1/final

Abstract: This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security protection resources or identify and evaluate...

<< first   < previous   72     73     74     75     76     77     78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96  next >  last >>