Computer Security Institute

Results: 1676



#Item
331International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
332Smartphones / Malware / Industrial design / Computer security / Macintosh / Computer network security / Computing / Security

2015 State of the Endpoint Report: User-Centric Risk Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: January 2015

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2015-01-14 14:20:02
333Computer security / Internet privacy / Privacy / Cloud computing / Information privacy / Information security / Email / Computing / Ethics / Security

The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA Sponsored by Zimbra Independently conducted by Ponemon Institute LLC Publication Date: November 2014

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2015-01-22 13:45:03
334Security / National security / Pacific Northwest National Laboratory / Richland /  Washington / Simulation / Agent-based model / Computer security / Internet-related prefixes / Haystack / Battelle Memorial Institute / United States Department of Energy National Laboratories / Complex systems theory

PNNL_Logo_with_Battel#ABC372-white

Add to Reading List

Source URL: cybersecurity.pnnl.gov

Language: English - Date: 2014-09-23 12:28:19
335Computer security / Cyberwarfare / Passphrase / Lorrie Cranor / Password policy / Password cracking / Cryptography / Security / Password

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay February 2015 CMU-ISR[removed]Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-02 16:44:46
336Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Security risk / Security / Computer security / Management

San-Diego-Outbrief_20130717.docx

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2013-07-24 17:12:26
337Cyberwarfare / Security / Computer network security / Quality assurance / Software assurance / Standards organizations / Vulnerability / Penetration test / National Institute of Standards and Technology / Software quality / Computer security / Software testing

Software Assurance During Maintenance Paul E. Black U.S. National Institute of Standards and Technology (NIST) [removed] Abstract

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
338Computer programming / Data-flow analysis / Pointer / Application security / SQL / Buffer overflow / Dataflow / Taint checking / Computing / Software engineering / Computer security

Dytan: A Generic Dynamic Taint Analysis Framework James Clause, Wanchun Li, and Alessandro Orso College of Computing Georgia Institute of Technology {clause|wli7|orso}@cc.gatech.edu

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-07-12 05:25:09
339Computing / Crime prevention / National security / Data security / Information security / Entrust / Security controls / IT risk / National Institute of Standards and Technology / Security / Computer security / Computer network security

NIST IR[removed]NIST IR 8050 EXECUTIVE TECHNICAL WORKSHOP ON IMPROVING CYBERSECURITY AND

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2015-04-02 15:27:04
340Security / Vulnerability / Insider / Threat / United States Department of Homeland Security / Software Engineering Institute / Security controls / Cyber Insider Threat / MSRAM / Computer security / Computer network security / Cyberwarfare

United States Coast Guard Has Taken Steps to Address Insider Threats, but Challenges Remain March 27, 2015

Add to Reading List

Source URL: www.oig.dhs.gov

Language: English - Date: 2015-04-02 13:56:38
UPDATE