CSD Rolodex
Tim Polk
(on detail) Group Manager for Cryptographic Technology Group
Computer Scientist
National Institute of Standards and Technology
Computer Security Division
Phone: 301-975-3348
Fax: 301-975-8670
Email:
http://www.nist.gov/public_affairs/contact.cfm
Projects:
Public Key
Infrastructure (PKI).
PKI is a major focus area for the Computer Security Division. I am currently
developing technical specifications for interoperable PKI components and
planning development of a reference implementation of those specifications.
I participate in the IETF's Internet Public Key Infrastructure (PKI-X)
standards development, and am supporting government agencies planning
near-term procurements of PKI components.
Professional Publications:
Here is a partial list of professional
publications. Where possible, I have included links to an electronic copy
of the document. If unspecified, the document is in PostScript. Some documents
are available in other forms on the division's web server.
- Polk, W. Timothy.
Federal Public Key Infrastructure (PKI) Technical
Specifications, Part A: Requirements. 31 January 1996. [265366 bytes]
- Polk, W. Timothy. A Mapping of Standards and DGSA Standards Requirements,
for DISA/CFS 15 November 1994.
- Bassham, Lawrence E. III and W. Timothy Polk. NISTIR 5283 Security
of SQL-based Implementations of Product Data Exchange Using STEP, October
1993.
- Polk, W. Timothy. Approximating Clark-Wilson "Access Triples" With
Basic UNIX Controls in UNIX Security Symposium IV Proceedings. 4-6 October,
1993.
- Polk, W. Timothy and Lawrence E. Bassham III.
NIST Special Publication 800-8 Security Issues in the Database Language
SQL, August 1993. [309397 bytes]
- Polk, W. Timothy and Lawrence E. Bassham III. Choosing Anti-Virus Tools,
in ABUINetwork News Volume 6, Number 3. May/June 1993.
- Polk, W. Timothy NIST
SP 800-6 Automated Tools for Testing Computer System Vulnerability,
December 1992. [309577 bytes]
- Polk, W. Timothy and Lawrence E. Bassham III.
NIST SP 800-5 A Guide to the Selection of Anti-Virus Tools and Techniques,
December 1992. [403464 bytes]
- Bassham, Lawrence E. III and W. Timothy Polk. Precise Identification
of Computer Viruses, in the proceedings of the 15th National Computer
Security Conference, Vol. II, 13-16 October 1992.
- Bassham, Lawrence E. III and W. Timothy Polk. NISTIR
4939 Threat Assessment of Malicious Code and External Attacks,
October 1992. [in HTML]
- Polk, W. Timothy and Lawrence E. Bassham, III. Security Tools for UNIX
Systems, in the Proceedings of the Fifth International Computer Virus &
Security Conference, 11-13 March 1992.
- Hsiao, Benjamin and W. Timothy Polk. Computer-Assisted Audit Techniques
for UNIX, in the 14th Department of Energy Computer Security Group Conference
Proceedings, 7-9 May 1991.
- Ruthberg, Zella G. and William T. Polk. NIST SP 500-168 Report of the
Invitational Workshop on Data Integrity, September 1989.
- Polk, W. Timothy and Lawrence E. Bassham, III. Expert Assistance for
the Manipulation of SGML Document Type Definitions, in the Proceedings
of the ACM Conference on Document Processing Systems, 5-9 December 1988.
Interests:
My family, my sail boat, and
my woodworking.