Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 51 through 60 of 67 matching records.
Privacy Engineering
The NIST privacy engineering program (PEP) supports the development of trustworthy information systems by applying measurement science and system engineering principles to the creation of frameworks, risk models, guidance, tools, and standards that...
Privacy-Enhancing Cryptography
The privacy-enhancing cryptography project seeks to promote the use of communication protocols that do not reveal unneeded private information of the communicating parties.There are many technical challenges in doing this, as it is typically hard to...
Program Review for Information Security Assistance PRISMA
The Program Review for Information Security Management Assistance (PRISMA) includes many review options and incorporates guidelines contained in Special Publication 800-53 (Revision 3), Recommended Security Controls for Federal Information...
Public Key Infrastructure Testing PKI
Testing PKI ComponentsNIST/Information Technology Laboratory responds to industry and user needs for objective, neutral tests for information technology. ITL recognizes such tests as the enabling tools that help companies produce the next generation of...
Random Bit Generation RBG
The following publications specify the design and implementation of random bit generators (RBGs), in two classes: Deterministic Random Bit...
Risk Management RMF
Federal Information Security Modernization Act (FISMA) Implementation Project OverviewProtecting the Nation's Critical Information InfrastructureThe FISMA Implementation Project was established in January 2003 to produce several key security standards...
Role Based Access Control RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) (also called "role based security"), as formalized in 1992 by David Ferraiolo and Rick Kuhn, has...
Roots of Trust RoT
Modern computing devices consist of various hardware, firmware, and software components at multiple layers of abstraction. Many security and protection mechanisms are currently rooted in software that, along with all underlying components, must be...
Security Aspects of Electronic Voting
The Help America Vote Act (HAVA) of 2002 was passed by Congress to encourage the upgrade of voting equipment across the United States. HAVA established the Election Assistance Commission (EAC) and the Technical Guidelines Development Committee (TGDC...
Security Content Automation Protocol SCAP
The Security Content Automation Protocol (SCAP) is a synthesis of interoperable specifications derived from community ideas. Community participation is a great strength for SCAP, because the security automation community ensures the broadest possible...

<< first   < previous   1     2     3     4     5     6     7  next >  last >>