Computer Security Institute

Results: 1676



#Item
641Security / Secure communication / Computer network security / Internet protocols / HTTP / HTTP Secure / Authentication / Opportunistic encryption / Transport Layer Security / Cryptographic protocols / Cryptography / Computing

Trust  Issues  with  Opportunistic  Encryption   Scott  Rose,  Stephen  Nightingale,  Doug  Montgomery   {scottr,  night,  [removed]}   National  Institute  of  Sta

Add to Reading List

Source URL: www.had-pilot.com

Language: English - Date: 2014-03-21 15:07:13
642Cryptographic Module Validation Program / FIPS 140-2 / Reference / FIPS 140 / National Voluntary Laboratory Accreditation Program / Validation / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography standards / Computer security / Evaluation

Title of Tutorial: Surviving the FIPS[removed]Validation Process Tom Caddy, Brenda Kallighan, Patricia Lareau, InfoGard Laboratories Inc. The Cryptographic Module Validation Program, which tests cryptographic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
643Computer network security / Public-key cryptography / Internet standards / Email authentication / Cryptographic software / Kerberos / Password / Challenge-response authentication / Pretty Good Privacy / Cryptography / Computer security / Computing

Technologies to Support Authentication in Higher Education v5 A. Young, I.T.Institute, University of Salford P.T. Kirstein, Department of Computer Science, University College London A. Ibbetson, Computing Laboratory, Uni

Add to Reading List

Source URL: www.ukoln.ac.uk

Language: English - Date: 1998-10-01 11:42:21
644FIPS 140-2 / Cryptographic Module Validation Program / Evaluation / FIPS 140 / FIPS 140-3 / Information security / Cryptographic Module Testing Laboratory / Cryptography standards / Computer security / Security

CRYPTOGRAPHIC MODULE VALIDATION PROGRAM: THE NEXT GENERATION (FIPS[removed]Panel Chair: Annabelle Lee, National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
645Computing / National Institute of Standards and Technology / Computer network security / Information security / Standards for Security Categorization of Federal Information and Information Systems / Security controls / Asset / NIST Special Publication 800-53 / TRAC / Computer security / Data security / Security

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-03 16:08:27
646Computer security / Data security / United States Department of Homeland Security / Federal Emergency Management Agency / Progressive collapse / September 11 attacks / Collapse of the World Trade Center / National Institute of Standards and Technology / Risk / Public safety / Management / Security

INTRODUCTION O ver the past century, New York City’s skyline has become an enduring image of America’s vitality and strength. Although each building faces a low

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2009-06-17 13:16:50
647Computer security / Aglets / Mobile agent / PERMIS / X.509 / Software agent / Public key certificate / Authorization certificate / Privilege Management Infrastructure / Cryptography / Public-key cryptography / Key management

Privilege Management of Mobile Agents Wayne Jansen, Tom Karygiannis National Institute of Standards and Technology Abstract: Most mobile agent systems use internal data structures within an agent to control and specify i

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
648Computer programming / Common Object Request Broker Architecture / Object request broker / Object Management Group / CSIv2 / Orbix / Service-oriented architecture / Interoperability / RMI-IIOP / CORBA / Software engineering / Computing

Panel Title: The Current State of the CORBA Security Market Panel Chair: Edward A. Feustel, Institute for Defense Analyses Panelists: Bob Blakley, DASCOM Inc. David M. Chizmadia, Computer Science Corporation Bret Hartman

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
649National security / Computer security / Computer crimes / Data security / CTIA – The Wireless Association / National Institute of Standards and Technology / International Multilateral Partnership Against Cyber Threats / Information security / United States Department of Homeland Security / Security / Public safety / Crime prevention

Before the Department of Commerce Washington, D.C. In the Matter of Experience With the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
650Rogue software / Multi-agent systems / Spamming / Trojan horses / Botnet / Zlob trojan / Rogue security software / Spyware / Conficker / Malware / System software / Computer network security

Measuring Pay-per-Install: The Commoditization of Malware Distribution Juan Caballero† , Chris Grier∗‡ , Christian Kreibich∗‡ , Vern Paxson∗‡ † IMDEA Software Institute ∗ UC Berkeley ‡ ICSI juan.cabal

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2011-06-08 14:05:55
UPDATE