Use this form to search content on CSRC pages.
Abstract: To advance the use of electronic commerce in federal government and other business transactions, the National Institute of Standards and Technology (NIST) issued Federal Information Processing Standard (FIPS) 186, Digital Signature Standard (DSS) on May 19, 1994. The standard becomes effective Decem...
Conference: 17th National Computer Security Conference Abstract: The Proceedings of the 17th National Computer Security Conference, "Communicating our Discipline: Strategies for the Emerging Information Infrastructures," held October 11-14, 1994 in Baltimore, Maryland. It includes refereed papers and panel summaries from the conference (listed on pp. iv-xv). Page...
Abstract: The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that sup...
Abstract: This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication...
Abstract: Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated between open systems. Information on a security label can be used to control access, specify protective measures, and determine handling restrictions required by a communica...
Abstract: This National Institute of Standards and Technology (NIST) Interagency Report (NISTIR) is a compendium of computer security training and awareness courses. The purpose of this publication is to assist federal agencies locate computer security training resources. This publication is part of a continu...
Abstract: The purpose of the Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness was to identify crucial issues on assurance in IT systems and to provide input into the development of policy guidance on determining the type and level of assurance appropriate in a given environme...
Abstract: The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that sup...
Abstract: The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and result in disruptions or degradation of servic...
Abstract: On June 10, 1994, the National Institute of Standards and Technology (NIST) hosted a one-day workshop to present and discuss key escrow encryption technology, including the recently-approved Escrowed Encryption Standard (EES), Federal Information Processing Standard (FIPS) Publication 185. Speakers...
Abstract: This standard specifies a Digital Signature Algorithm (DSA) which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signa...
Abstract: Connection to the Internet provides users and organizations quick and easy access to information, data, software, and discussion groups on every subject imaginable. Access to information on the Internet has become easier and more efficient since the appearance of the mosaic application. This client...
Abstract: This report presents the results of a NIST study to determine and document what federal agencies need to meet their information technology (IT) security requirements. A meeting of the NIST IT SecurIty Needs Study Working Group was held at NIST in September 1992 to review and comment on the study res...
Abstract: The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that sup...
Abstract: This report is a preliminary study on the feasibility and possible use of electronic research notebooks (ERNs) at the National Institute of Standards and Technology (NIST). The goal of this project is to determine the requirements for ERN and to assess current technologies for the design of a protot...
Abstract: The first draft of the Federal Criteria was made public in January 1993. Several thousand copies of the Federal Criteria were distributed and comments on this first draft were received between January and April of 1993. Over 20,000 comments were obtained from approximately 120 organizations. These o...
Abstract: Computer systems are vulnerable to many threats which can inflict various types of damage resulting in significant losses. Damage can range from minor errors which sap database integrity to fires which destroy entire computer centers. Losses can stem from the actions of supposedly trusted employees...
Abstract: This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be implemented in electronic devices and used for protecting government telecommunications when such protection is desired. The algorithm and the LEAF creation method are cl...
Abstract: The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security in its computer and telecommunication systems. This publication provides a standard to be used by Federal organizations when these...
Abstract: The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that sup...
In: Handbook of Information Security Management Abstract:
In: Handbook of Information Security Management Abstract:
In: Handbook of Information Security Management Abstract: