U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2201 through 2225 of 13539 matching records.
Publications Conference Proceedings October 13, 1992
https://csrc.nist.rip/publications/detail/conference-paper/1992/10/13/proceedings-15th-national-computer-security-conference-1992

Conference: 15th National Computer Security Conference Abstract: The Proceedings of the 15th National Computer Security Conference, "Information Systems Security: Building Blocks to the Future," held October 13-16, 1992 in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. iv-x of Vol. 1). Pages xi-xii of...

Publications Conference Proceedings October 13, 1992
https://csrc.nist.rip/publications/detail/conference-paper/1992/10/13/role-based-access-controls

Conference: 15th National Computer Security Conference (NCSC) Abstract: While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a...

Publications Conference Proceedings June 15, 1992
https://csrc.nist.rip/publications/detail/conference-paper/1992/06/15/an-analysis-of-selected-software-safety-standards

Conference: Seventh Annual Conference on Computer Assurance Abstract: This study examines standards, draft standards, and guidelines that provide requirements for the assurance of high-integrity software. It focuses on identifying the attributes necessary in such documents for providing reasonable assurance for high-integrity software, and on identifying the relative...

Publications Conference Proceedings October 7, 1991
https://csrc.nist.rip/publications/detail/conference-paper/1991/10/07/high-integrity-software-standards-activities-at-nist

Conference: Ninth Annual Pacific Northwest Software Quality Conference Abstract: This paper provides information about the National Institute of Standards and Technology (NIST) effort to produce a comprehensive set of standards and guidelines for the assurance of high integrity software. In particular, the paper presents the results of a Workshop on the Assurance of High Integri...

Publications Conference Proceedings October 1, 1991
https://csrc.nist.rip/publications/detail/conference-paper/1991/10/01/proceedings-14th-national-computer-security-conference-1991

Conference: 14th National Computer Security Conference Abstract: The Proceedings of the 14th National Computer Security Conference, "Information Systems Security: Requirements & Practices," held October 1-4, 1991 in Washington, D.C. It includes refereed papers and panel summaries from the conference (listed on pp. iv-ix of Vol. 1).

Publications Book Section January 1, 1991
https://csrc.nist.rip/publications/detail/book/1991/a-framework-for-computer-security-risk-management

In: The Analysis, Communication, and Perception of Risk Abstract: For the past few years, the National Institute of Standards and Technology (NIST; formerly the National Bureau of Standards) and the National Security Agency (NSA) have been jointly developing a framework for computer security risk management. The need for this framework became increasingly apparent...

Publications Conference Proceedings October 1, 1990
https://csrc.nist.rip/publications/detail/conference-paper/1990/10/01/proceedings-13th-national-computer-security-conference-1990

Conference: 13th National Computer Security Conference Abstract: The Proceedings of the 13th National Computer Security Conference, "Information Systems Security: Standards--the Key to the Future," held October 1-4, 1990 in Washington, D.C. It includes refereed papers and panel summaries from the conference (listed on pp. iv-xi of Vol. 1).

Publications Journal Article March 1, 1990
https://csrc.nist.rip/publications/detail/journal-article/1990/conference-report-12th-ncsc-1989

Journal: Journal of Research of the National Institute of Standards and Technology Abstract: The National Computer Systems Laboratory (NCSL) of the National Institute of Standards and Technology (NIST) and the National Computer Security Center (NCSC) of the Department of Defense (DoD) co-sponsored the Twelfth National Computer Security Conference held in Baltimore, Maryland on October 10-13...

Publications Conference Proceedings October 10, 1989
https://csrc.nist.rip/publications/detail/conference-paper/1989/10/10/proceedings-12th-national-computer-security-conference-1989

Conference: 12th National Computer Security Conference Abstract: The Proceedings of the 12th National Computer Security Conference, "Information Systems Security: Solutions for Today--Concepts for Tomorrow," held October 10-13, 1989 in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. ii-ix).

Publications Conference Proceedings October 10, 1989
https://csrc.nist.rip/publications/detail/conference-paper/1989/10/10/a-token-based-access-control-system-for-computer-networks

Conference: 12th National Computer Security Conference (NCSC) Abstract: This paper describes a Token Based Access Control System (TBACS) developed by the Security Technology Group of the National Institute of Standards and Technology (NIST). TBACS replaces traditional password based access control systems which have often failed to prevent logins by unauthorized parties...

Publications Journal Article September 1, 1989
https://csrc.nist.rip/publications/detail/journal-article/1989/generating-extended-state-transitions-from-structured-specs

Journal: Software Engineering Journal Abstract: The paper describes a method for providing improved prototyping capabilities in a process control system emulation tool. The tool, the NIST Hierarchical Control System Emulator, allows concurrent execution of modules emulating both physical processes and decision processes. The concurrent modules ar...

Publications Journal Article July 3, 1989
https://csrc.nist.rip/publications/detail/journal-article/1989/conference-report-11th-ncsc-1988

Journal: Journal of Research of the National Institute of Standards and Technology Abstract: The National Computer Systems Laboratory (NCSL) and the National Computer Security Center (NCSC) of the Department of Defense co-sponsored the Eleventh National Computer Security Conference held in Baltimore, Maryland on October 17-20, 1988. More than 1600 attendees from government, industry, and ac...

Publications Conference Proceedings October 17, 1988
https://csrc.nist.rip/publications/detail/conference-paper/1988/10/17/proceedings-11th-national-computer-security-conference-1988

Conference: 11th National Computer Security Conference Abstract: The Proceedings of the 11th National Computer Security Conference, "Computer Security...Into the Future," held October 10-17, 1988, in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. ii-vii of Vol. 1).

Publications Conference Proceedings October 17, 1988
https://csrc.nist.rip/publications/detail/conference-paper/1988/10/17/static-analysis-tools-for-software-security-certification

Conference: 11th National Computer Security Conference Abstract: This paper describes a suite of tools used in evaluating software for security certification. The tools are currently being used on software for secure Electronic Funds Transfer, but could be applied to other applications as well.

Publications Journal Article October 1, 1988
https://csrc.nist.rip/publications/detail/journal-article/1988/accuracy-integrity-and-security-in-computerized-vote-tallying

Journal: Communications of the ACM Abstract: The following excerpts have been gleaned from a 130-page report of potential inaccuracies and fraud in computerized voting systems. Recent difficulties in automated vote-tallying, including specific legal cases, are detailed along with a summary of conclusions and recommendations.

Publications White Paper September 1, 1988
https://csrc.nist.rip/publications/detail/white-paper/1988/09/01/auditing-password-usage/final

Abstract: Passwords are often used to authenticate a system user's identity and to grant or deny access to data. The National Bureau of Standards' recently published Password Usage Standard outlines effective password implementation and control rules. Using this standard as a guide, the EDP auditor can assess...

Publications Journal Article May 1, 1988
https://csrc.nist.rip/publications/detail/journal-article/1988/the-data-encryption-standard-past-and-future

Journal: Proceedings of the IEEE Abstract: The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard during the early 1970s, the controversy regarding the proposed stan...

Publications Conference Proceedings September 21, 1987
https://csrc.nist.rip/publications/detail/conference-paper/1987/09/21/proceedings-10th-national-computer-security-conference-1987

Conference: 10th National Computer Security Conference Abstract: The Proceedings of the 10th National Computer Security Conference, "Computer Security...from principles to practices.," held September 21-24, 1987, in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. ii-vii).

Publications Conference Proceedings September 15, 1986
https://csrc.nist.rip/publications/detail/conference-paper/1986/09/15/proceedings-9th-national-computer-security-conference-1986

Conference: 9th National Computer Security Conference Abstract: The Proceedings of the 9th National Computer Security Conference, "Computer Security--for today...and for tomorrow," held September 15-18, 1986, in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. ii-iv of Vol. 1).

Publications White Paper December 26, 1985
https://csrc.nist.rip/publications/detail/white-paper/1985/12/26/dod-rainbow-series/final

Abstract: The Rainbow Series of Department of Defense standards is outdated, out of print, and provided here for historical purposes ONLY. The following is only a partial list--a more complete collection is available from the Federation of American Scientists: DoD 5200.28-STD "Orange Book", ...

Publications Conference Proceedings September 30, 1985
https://csrc.nist.rip/publications/detail/conference-paper/1985/09/30/proceedings-8th-national-computer-security-conference-1985

Conference: 8th National Computer Security Conference Abstract: The Proceedings of the 8th National Computer Security Conference, held September 30-October 3, 1985, in Gaithersburg, Maryland.

Publications Conference Proceedings September 24, 1984
https://csrc.nist.rip/publications/detail/conference-paper/1984/09/24/7th-dod-nbs-computer-security-conference

Conference: 7th DoD/NBS Computer Security Conference Abstract: The Proceedings of the 7th DoD/NBS Computer Security Conference, held September 24-26, 1984, in Gaithersburg, Maryland. [The following year, this was renamed the "National Computer Security Conference."]

Publications Conference Proceedings November 15, 1983
https://csrc.nist.rip/publications/detail/conference-paper/1983/11/15/proceedings-6th-seminar-on-the-dod-computer-security-initiative

Conference: 6th Seminar on the DoD Computer Security Initiative Abstract: The Proceedings of the 6th Seminar of the DoD Computer Security Initiative, held November 15-17, 1983, in Gaithersburg, Maryland.

Publications Journal Article November 1, 1982
https://csrc.nist.rip/publications/detail/journal-article/1982/reflections-on-ten-years-of-computer-security

Journal: Computers & Security Abstract: The progress in computer security in the last ten years is reviewed by the authors of the “Executive Guide for Computer Security.” This Guide was based on the results of a Workshop on Controlled Accessibility held ten years ago in December 1972.

Publications Conference Proceedings May 24, 1982
https://csrc.nist.rip/publications/detail/conference-paper/1982/05/24/proceedings-5th-seminar-dod-computer-security-initiative

Conference: 5th Seminar on the DoD Computer Security Initiative Abstract: The Proceedings of the Fifth Seminar of the DoD Computer Security Initiative, held Mary 24-26, 1982, in Gaithersburg, Maryland. [This seminar later became the National Computer Security Conference, in 1985.]

<< first   < previous   77     78     79     80     81     82     83     84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100     101  next >  last >>