CSRC

Results: 4036



#Item
941Access control / Role-based access control / Identity management / Filesystem permissions / Delegation / Privilege / PERMIS / Access Control Matrix / Ls / Computer security / Security / Computing

A Role-Based Delegation Model and Some Extensions Ezedin Barka and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department, MS 4A4 George Mason University, Fairfax, VA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
942Antivirus software / Spyware / Computer virus / Computer worm / Rogue software / Trojan horse / Macro virus / Back Orifice / Linux malware / System software / Malware / Software

From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour Dr. Klaus Brunnstein Professor for Appplication of Informatics Faculty for Informatic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
943Digital signature / X.509 / Certificate server / Cryptosystem / Key server / Key / Public key infrastructure / Key authentication / Cryptography / Key management / Public-key cryptography

PKI - Sham or Salvation? Chair - Jon David Lehman Brothers Panelists Padgett Peterson Lockheed-Martin Tim Polk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
944Public-key cryptography / Electronic commerce / Secure communication / Access control / X.509 / Public key certificate / HTTP Secure / X.500 / Transport Layer Security / Cryptography / Security / Cryptographic protocols

Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web Joon S. Park and Ravi Sandhu The Laboratory for Information Security Technology Information and Software Engineering Department George Mason Uni

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
945Surveillance / BioAPI / Hand geometry / William Saito / Biometric passport / Biometrics Institute / Biometrics / Security / National security

22nd NISS Conference Submission: Tutorial

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
946Computer security / Vulnerability / Cyberwarfare / Computing / Prevention / Security / Gene Spafford

Panel Title: How can the Security Community Share Detailed Attack and Vulnerability Information? Panel Chair: Peter Mell, NIST Panelists: Matt Bishop, University of California at Davis Gene Spafford, CERIAS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
947Science / ISO standards / OSI protocols / Network architecture / OSI model / Intelligent agent / FIPA / Agent-based model / Agent Communications Language / Multi-agent systems / Computing / Artificial intelligence

Towards XML As A Secure Intelligent Agent Communication Language by Alexander D. Korzyk, Sr. Agenda

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
948Education / Software engineer / Information security / Public safety / Volgenau School of Information Technology and Engineering / Northeastern University College of Computer and Information Science / Monterey /  California / Naval Postgraduate School / Security

PANEL TITLE: UNIVERSITY APPROACHES TO INFORMATION SECURITY EDUCATION - CHALLENGES, ISSUES, SUCCESSES, AND OPPORTUNITIES PANEL CHAIR: Dr. Rayford Vaughn ( Mississippi State University): Dr. Vaughn teaches computer securit

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
949Computer network security / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Authorization / Role-based access control / XACML / Mandatory access control / Security / Computer security / Access control

Implementation of Multiple Access Control Policies within a CORBASEC framework Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
950Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / Data Encryption Standard / LOKI97 / Key size / AES implementations / SAFER / MAGENTA / Cryptography / Advanced Encryption Standard / Block ciphers

Status of the Advanced Encryption Standard (AES) Development Effort James Foti * National Institute of Standards and Technology Keywords: AES, Advanced Encryption Standard, cryptography, encryption.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE