National Institute of Standards and Technology (U.S.), Computer Security Division
Label
National Institute of Standards and Technology (U.S.), Computer Security Division
Name
National Institute of Standards and Technology (U.S.)
Subordinate unit
Computer Security Division
Actions
Incoming Resources
- Contributor of28
- Guidance for securing Microsoft Windows XP for IT Professionals, a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology, Murugia Souppaya, Karen Kent, Paul M. Johnson
- Security issues in the database language SQL, W. Timothy Polk, Lawrence E. Bassham, III
- Computer security considerations in federal procurements, a guide for procurement initiators, contracting officers, and computer security officials, Barbara Guttman
- Cryptographic algorithms and key sizes for personal identity verification, W. T. Polk, D. F. Dodson, W. E. Burr, H. Ferraiolo, D. A. Cooper
- Cryptographic algorithms and key sizes for personal identity verification, W. T. Polk, D. F. Dodson, W. E. Burr
- Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS), requirements and procedures, S. S. Keller
- Guidelines on security and privacy in public cloud computing, W. Jansen, T. Grance
- Keeping your site comfortably secure, an introduction to Internet firewalls, John P. Wack, Lisa J. Carnahan
- Engineering principles for information technology security (a baseline for achieving security), recommendations of the National Institute of Standards and Technology, Gary Stoneburner, Clark Hayden, Alexis Feringa
- Security considerations in the information system development life cycle, T. Grance, J. Hash, M. Stevens
- Guideline for implementing cryptography in the federal government, Annabelle Lee
- Good security practices for electronic commerce, including electronic data interchange, Roy G. Saltman
- Establishing a computer security incident response capability (CSIRC), John P. Wack
- Guide to Attribute Based Access Control (ABAC) definition and considerations, V. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, K. A. Scarfone
- PIV middleware and PIV card application conformance test guidance (SP 800-73 compliance), R. Chandramouli, L. Eyuboglu, K. Mehta
- Interfaces for personal identity verification, J. F. Dray, S. Guthery, T. Schwarzhoff
- Guide for developing security plans for information technology systems, Marianne Swanson
- Bibliography of selected computer security publications, January 1980-October 1989, Lawrence E. Bassham III
- Automated tools for testing computer system vulnerability, W. Timothy Polk
- Border gateway protocol security, D. R. Kuhn, K. Sriram, D. C. Montgomery
- Security in open systems, John Barkley
- Recommendation for key derivation through extraction-then-expansion, L. Chen
- A statistical test suite for random and pseudorandom number generators for cryptographic applications, Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo
- Approximate matching, definition and terminology, F. Breitinger, D. White, B. Guttman, M. McCarrin, V. Roussev
- Public-key cryptography, James Nechvatal
- The impact of the FCC's Open Network Architecture on NS/NP telecommunications security, Karen Olsen, John Tebbutt
- A guide to the selection of anti-virus tools and techniques, W. Timothy Polk, Lawrence E. Bassham III
- Recommendation for block cipher modes of operation, the CCM mode for authentication and confidentiality, M. J. Dworkin