CSRC

Results: 4036



#Item
961Formal methods / Mathematics / Diagrams / Specification and Description Language / Invariant / Finite-state machine / Extended finite-state machine / Vulnerability / Buffer overflow / Computing / Models of computation / Theoretical computer science

Abstracting Security Specifications in Building Survivable Systems J. Jenny Li and Mark Segal Telcordia Technologies (formerly Bellcore) 445 South Street, Morristown NJ[removed]USA Email: [removed]; Phone: (97

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
962Public safety / Data security / Computer network security / Crime prevention / National security / Information security / Certified Information Systems Auditor / System monitoring / Access control / Security / Computer security / Computing

Infrastructure Monitoring Challenges J. L. Bayuk Overview When charged with monitoring the security of an enterprise, an information systems security professional must make choices. There are never enough resources to mo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
963Information / Public-key cryptography / Communications protocol / Password-authenticated key agreement / Yahalom / Cryptography / Cryptographic protocols / Data

Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case Jim Alves-Foss Center for Secure and Dependable Software University of Idaho Moscow, ID[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
964Computer network security / Denial-of-service attacks / Cyberwarfare / Internet standards / Traceroute / Traffic flow / Transmission Control Protocol / Ping / Firewall / Computing / Internet / Network architecture

Subliminal Traceroute in TCP/IP Thomas E. Daniels, Eugene H. Spafford {daniels,spaf}@cerias.purdue.edu CERIAS Purdue University West Lafayette, IN 47907

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
965National security / Crime prevention / Certified Information Systems Security Professional / Information security / Information assurance / Multilevel security / Security / Data security / Computer security

What about I3 - INFOSEC Integration Issues: "What worked, did not work, and why?" Jim Litchko General Manager IMSI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
966Computing / Vulnerability / Denial-of-service attack / Attack / Penetration test / Buffer overflow / Exploit / JavaScript / Zero-day attack / Computer network security / Cyberwarfare / Computer security

Understanding the World of your Enemy with I-CAT (Internet- Categorization of Attacks Toolkit) Peter Mell NIST, Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
967Computer network security / Computing / National security / Security controls / Information security management system / Federal Information Security Management Act / Cyber security standards / Computer security / Security / Data security

Tutorial Developing Security Plans for Information Technology Systems Instructor: Marianne Swanson, National Institute of Standards and Technology The objective of system security planning is to improve protection of inf

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
968Security / Ubiquitous computing / Computer security / Common Criteria / National Information Assurance Partnership / Computing / Protection Profile / Card reader / Identity document / ISO standards / Evaluation / Smart cards

USING THE COMMON CRITERIA IN SMART CARD SECURITY Title of Panel: Using the Common Criteria in Smart Card Security Panel Chair: Stuart W. Katzke, PhD Chief Scientist, Information Assurance Solutions Group National Securit

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
969Computing / Telephony / Internet access / Computer network security / Logical Link Control / Dialer / War dialing / Firewall / Computer network / Internet / Electronic engineering / Modems

A Common Weak-Link in the Security Chain Gregory B. White, Ph.D. SecureLogix Corporation [removed] Keywords: Dial-up connections, Modems, Network Security, Intrusions/Penetrations Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
970Public safety / Crime prevention / National security / Computer security / Data security / Database / Password / Access control / Information security / Security / Database management systems / Data management

Database Security 2000 John R. Campbell National Security Agency Fort Meade, MD[removed] +[removed]Fax: +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE