CSRC

Results: 4036



#Item
991Cryptographic Module Validation Program / FIPS 140-2 / Reference / FIPS 140 / National Voluntary Laboratory Accreditation Program / Validation / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography standards / Computer security / Evaluation

Title of Tutorial: Surviving the FIPS[removed]Validation Process Tom Caddy, Brenda Kallighan, Patricia Lareau, InfoGard Laboratories Inc. The Cryptographic Module Validation Program, which tests cryptographic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
992Fortezza / PKCS11 / PKCS / Public key infrastructure / Security token / X.509 / S/MIME / Software / Netscape / Cryptography

MAKING NETSCAPE COMPATIBLE WITH FORTEZZA® – LESSONS LEARNED George Ryan [removed] Pulse Engineering, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
993Role-based access control / PERMIS / Mandatory access control / Discretionary access control / NIST RBAC model / Computer security / Security / Access control

The OM-AM Framework and Role-Based Access Control Prof. Ravi Sandhu George Mason University www.list.gmu.edu

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
994Crime prevention / National security / Computer network security / Software testing / Vulnerability / Common Criteria / Information security / Social vulnerability / National Security Agency / Security / Computer security / Cyberwarfare

Databases of threats and countermeasures Jim Williams (Chair), The MITRE Corporation Natalie Brader, L-3 Network Security Douglas McGovern, Ray-McGovern Technical Consultants Kenneth Olthoff, NSA Adam Shostack, BindView

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
995Computing / Cyberwarfare / Crime prevention / National security / Security service / Threat / ENIAC / Standards for Security Categorization of Federal Information and Information Systems / Information security / Computer network security / Security / Computer security

Computer Security from the Trojan Wars to the Present Charles P. Pfleeger Exodus Security Services [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
996Electronic commerce / Cryptographic protocols / Computer network security / Entrust / Public key infrastructure / X.509 / Verisign / Digital signature / Cryptography / Public-key cryptography / Key management

PKI – The Gap Between Products and Standards Panel Proposal Panel Chair: Santosh Chokani, CygnaCom Solutions Panelists: Sharon Boeyen, Entrust Patrick Cain, BBN Technologies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
997Crime prevention / National security / Cyberwarfare / Information Risk Management / Information assurance / Vulnerability / Information security / Software assurance / Software security assurance / Security / Computer security / Data security

Information Assurance Metrics: Prophecy, Process, or Pipedream? Panel Chair: Ronda R. Henning, Harris Corporation Panelists: Michael J. Skroch, DARPA John McHugh , Carnegie Mellon Center for Survivable Systems John Micha

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
998Computer network security / Crime prevention / National security / Computing / Public safety / Government Secure Intranet / Intranet / Information security / Information assurance / Security / Computer security / Computer networks

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
999Commodore 64 / Commodore 64 music / MOS Technology SID / Video game music / Predicate / SQL / Sentence / Linguistics / Computing / Electronics

A Query Facility for Common Intrusion Detection Framework Peng Ning, X. Sean Wang, Sushil Jajodia Center for Secure Information Systems George Mason University, Fairfax, VA 22030, USA Voice: ([removed]f1629, 1662, 1653g,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
1000Public safety / Data security / Computer security / Information security / Trusted Information Systems / Public key infrastructure / Peter G. Neumann / RISKS Digest / Security / Crime prevention / National security

From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22nd National Information Systems Security Conference Fall, 1999 Panel Chair:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE