CSRC

Results: 4036



#Item
771Concurrent computing / Apache Hadoop / HBase / Big data / Database / File system / Data center / NoSQL / BigTable / Computing / Database management systems / Data management

An Access Control Scheme for Big Data Processing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-23 09:43:18
772Gaithersburg /  Maryland / Statistics / Federal Information Processing Standard / Evaluation / Reference / FIPS 140-3 / FIPS 140-2 / National Institute of Standards and Technology / Cryptography standards / Standards organizations

NISTIR[removed]NIST Cryptographic Standards and Guidelines Development Process (Second Draft) The Cryptographic Technology Group

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-23 10:25:26
773Role-based access control / XACML / Discretionary access control / PERMIS / Information security / Authorization / Security management / Capability-based security / Federal Information Security Management Act / Security / Computer security / Access control

NIST 7316, Assessment of Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-15 09:51:53
774Computer security / Identity management / FIPS 140 / Controller / Cryptography standards / Security / Access control

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-06 09:12:24
775Computer security / Identity management / FIPS 140 / Controller / Computing / Cryptography standards / Security / Access control

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 14:47:27
776Brocade Communications Systems / Stackable switch / Computing / FIPS 140-2 / FIPS 140 / Network switch / ICx / Cryptography standards / Ethernet / Networking hardware

Microsoft Word - TID[removed]5CM6-Brocade_Co[removed]V1_140sp.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-07 09:27:30
777FIPS 140-2 / FIPS 140 / USB flash drive / Cryptographic Module Validation Program / HMAC / Kingston Technology / Password / Universal Serial Bus / Cryptographic hash function / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1g - Kingston DT4000 G2 FIPS[removed]Level 3 Security Policy v1.8.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:47:56
778Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
779Computing / UniMate / Security token / PKCS / Two-factor authentication / FIPS 140 / Secutech Solution / Universal Serial Bus / Smart card / Cryptography standards / Cryptography / Computer security

UNIMATE USB/TRRS PKI TOKEN FIPS[removed]SECURITY POLICY DOCUMENT VERSION: 1.3 DATE: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-04 23:16:18
780Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
UPDATE