NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

Search the fulltext of NIST's computer security publications:

  Advanced Search

govdelivery bubble icon Sign Up for Email Alerts from NIST's Computer Security Division:

Selected Historical Computer Security Papers


Historical NIST Papers | Archives | DoD Rainbow Series
General Interest Papers: 1 | 2 | 3

General Interest Computer Security Papers (2)

Eavesdropping on the Electronic Emanations of Digital Equipment: the Laws of Canada, England and the United States (DRAFT)
Christopher Seline
1989

The Economic Impact of Role-Based Access Control (Planning Report 02-1)
RIT (prepared for NIST Program Office, Strategic Planning and Economic Analysis Group)
March 2002

The Economic Impacts of NIST's Data Encryption Standard (DES) Program (Planning Report 01-2)
TASC, Inc. (prepared for NIST Program Office, Strategic Planning and Economic Analysis Group)
October 2001

Endorsed Tools List
National Computer Security Center
ca. 1988

An Evening With Berferd In Which a Cracker is Lured, Endured, and Studied
Bill Cheswick, AT&T Bell Laboratories
December 7, 1992

Forming an Incident Response Team
Danny Smith, Australian Computer Emergency Response Team (CERT)
1994

Foundations for the Harmonization of Information Technology Security Standards (REVISED DRAFT)
Joint Task 01 (JT01)
February 1993

Foundations for the Harmonization of Information Technology Security Standards (REVISED DRAFT, Version b)
Joint Task 01 (JT01)
April 1993

A Guideline on Office Automation Security
National Computer Security Center
November 10, 1993

Guidelines for the Secure Operation of the Internet (RFC 1281)
R. Pethia and B. Fraser, CERT/Software Engineering Institute; S. Crocker, Trusted Information Systems, Inc.
November 1991

Improving the Security of Your Unix System
David A. Curry, SRI International
April 1990

Information Technology Security Evaluation Criteria (ITSEC)
June 1991

Legal Issues - A Site Manager's Nightmare
Stephen E. Hansen, Stanford University
1990

Limitations of the Kerberos Authentication System
Steven M. Bellovin and Michael Merritt, AT&T Bell Laboratories
1991

Back to Top


< Back to General Interest Papers (1)
Continue to General Interest Papers (3) >