CSRC

Results: 4036



#Item
911Cryptography standards / FIPS 140 / SerDes

FIPS 140 Validation Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:41:54
912Critical Security Parameter / Computing / Cyberwarfare / Cryptography standards / Computer security / FIPS 140

IBM Corporation IBM Security QRadar FIPS Appliance Hardware Part Number: QR24; Firmware Version: v7.1 MR1 FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:26:25
913Internet protocols / Secure communication / Cryptography standards / SHA-2 / HMAC / Secure Shell / Cipher suite / Key size / Key generation / Cryptography / Key management / Cryptographic hash functions

Microsoft Word - 201i - McAfee NSP V7.1 IPS-NAC SecurityPolicy v1.20.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:08:42
914Integrated development environments / Instruction set architectures / Cryptographic software / Cross-platform software / X86 architecture / X86-64 / 64-bit / Microsoft Visual Studio / Itanium / Software / Computing / Computer architecture

RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy Level 1 with Level 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-05 15:56:07
915Role-based access control / NIST RBAC model / PERMIS / Role hierarchy / Discretionary access control / Principle of least privilege / Filesystem permissions / Delegation in IT / AGDLP / Computer security / Security / Access control

A role-based access control model and reference implementation within a corporate intranet

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:22:16
916Predicate logic / Propositional calculus / Semantics / Model theory / First-order logic / Cross-linked polyethylene / Function / Predicate / Propositional formula / Logic / Mathematical logic / Mathematics

A Technique for Analyzing the Effects of Changes in Formal Specifications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-18 20:03:24
917

Role Based Access Control for the World Wide Web

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2014-12-18 19:32:02
    918Authentication / Login / Transaction authentication number / Password / Security token / SecurID / Security / Computer security / Access token

    Formal specification and verification of control software for cryptographic equipment - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-18 20:05:29
    919Risk analysis / Management / Data security / Risk management / Asset / Information security / Threat / Vulnerability / IT risk management / Computer security / Security / Risk

    Effective Risk Analysis Thomas R. Peltier, CISSP SM Driving eBusiness Performance

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2000-11-03 00:00:00
    920Statistics / Fuzzy logic / Non-classical logic / Mathematics / Intrusion detection system / Anomaly detection / Genetic fuzzy systems / Fuzzy control system / Artificial intelligence / Logic / Logic in computer science

    FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [removed] Rayford B. Vaughn

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2000-11-03 00:00:00
    UPDATE