Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 2376 through 2400 of 2816 matching records.
Publications IR 5283 (Final) October 1, 1993
https://csrc.nist.gov/pubs/ir/5283/final

Abstract: The Database Language SQL (SQL) is a widely used language for accessing and manipulating relational databases. As such, SQL can be of use in many different operational environments, with correspondingly different needs for security. One specific application of this standard is in Product Data Exchan...

Publications IR 5247 (Final) August 1, 1993
https://csrc.nist.gov/pubs/ir/5247/final

Abstract: A Workshop on Security Procedures for the Interchange of Electronic Documents, sponsored by the National Institute of Standards and Technology (NIST) and the Office of Management and Budget (0MB) , was held at NIST in Gaithersburg, Maryland, on November 12th and 13th, 1992. The impetus for the works...

Publications ITL Bulletin (Final) July 1, 1993
https://csrc.nist.gov/pubs/itlb/1993/07/connecting-to-the-internet-security-considerations/final

Abstract: This bulletin focuses on security considerations for organizations considering Internet connections. Spurred by developments in high-speed networking technology and the National Research and Education Network (NREN), many organizations and individuals are looking at the Internet as a means for expan...

Publications IR 5232 (Final) May 1, 1993
https://csrc.nist.gov/pubs/ir/5232/final

Abstract: The Workshop on NSFNET/NREN Security was hosted by NIST and sponsored by NSF to address the need for improving the security of national computer networks. Emphasis was on identifying off-the-shelf security technology that could be implemented in the NSF Network, especially to control access to the s...

Publications IR 5153 (Final) March 1, 1993
https://csrc.nist.gov/pubs/ir/5153/final

Abstract: [NOTE: THIS DOCUMENT HAS BEEN SUPERSEDED BY THE FEDERAL CRITERIA.] The Minimum Security Requirements for Multi-User Operating Systems (MSR) document provides basic commercial computer system security requirements applicable to both government and commercial organizations. These requirements include...

Publications IR 4983 (Final) November 1, 1992
https://csrc.nist.gov/pubs/ir/4983/final

Abstract: For communications between computer systems to be useful in many environments, the systems and their communications must be secure. One prerequisite to secure communications is the management of keying material needed by the underlying cryptographic mechanisms that provide security. This report addr...

Publications IR 4933 (Final) September 1, 1992
https://csrc.nist.gov/pubs/ir/4933/final

Abstract: An electronic bulletin board system (BBS) is similar to a regular bulletin board, except that all posted information is stored on a computer rather than on a wall. A BBS has several features which a regular bulletin board does not have. For example, on a BBS, one person can leave a message for anoth...

Publications IR 4846 (Final) May 1, 1992
https://csrc.nist.gov/pubs/ir/4846/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) is a compendium of computer security training and awareness courses. The purpose of this publication is to assist federal agencies locate computer security training resources. This publication is part of a continuing NIS...

Publications IR 4774 (Final) March 1, 1992
https://csrc.nist.gov/pubs/ir/4774/final

Abstract: Several United States and European documents describing criteria for specifying and evaluating the trust of computer products and systems have been written. This report reviews five of these documents and discusses the approach each one uses to provide criteria for specifying and evaluating the trus...

Publications ITL Bulletin (Final) February 1, 1992
https://csrc.nist.gov/pubs/itlb/1992/02/establishing-a-computer-security-incident-handling/final

Abstract: Computer systems and the information they store are valuable resources that need to be protected. Increasingly sophisticated threats including system and network intruders, computer viruses, and network worms can exploit a variety of weaknesses in computer systems and cause significant damage. Due t...

Publications IR 4734 (Final) February 1, 1992
https://csrc.nist.gov/pubs/ir/4734/final

Abstract: The National Research and Education Network (NREN) is an integral part of the planned High-Performance Computing and Communication (HPCC) infrastructure that will extend throughout the scientific, technical and education communities. The projected vision is one of desks and laboratory benches as ent...

Publications IR 4749 (Final) December 1, 1991
https://csrc.nist.gov/pubs/ir/4749/final

Abstract: Each federal organization is fully responsible for its computer security program whether the security program is performed by in- house staff or contracted out. Time constraints, budget constraints, availability or expertise of staff, and the potential knowledge to be gained by the organization from...

Publications IR 4667 (Final) (Withdrawn) September 1, 1991

https://csrc.nist.gov/pubs/ir/4667/final

Abstract: An electronic bulletin board system (BBS) is similar to a regular bulletin board, except that all posted information is stored on a computer rather than on a wall. A BBS has several features which a regular bulletin board does not have. For example, on a BBS, one person can leave a message for anoth...

Publications IR 4659 (Final) September 1, 1991
https://csrc.nist.gov/pubs/ir/4659/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) presents a glossary of computer security terminology, whose development was sponsored under the auspices of the National Security Telecommunications and Information Systems Security Committee (NSTISSC) . This glossary is...

Publications IR 4545 (Final) April 1, 1991
https://csrc.nist.gov/pubs/ir/4545/final

Abstract: This National Institute of Standards and Technology Internal Report (NISTIR) presents nine articles which represent a wide spectrum of computer security information. The articles were selected by the staff of the Computer Security Division, Computer Systems Laboratory, at the National Institute of S...

Publications IR 4451 (Final) November 1, 1990
https://csrc.nist.gov/pubs/ir/4451/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) presents the Methodology for Certifying Sensitive Computer Applications developed by the U.S. Department of Commerce, Office of Information Resources Management. The National Institute of Standards and Technology (NIST)...

Publications IR 4387 (Final) August 1, 1990
https://csrc.nist.gov/pubs/ir/4387/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) presents the Simplified Risk Analysis Guidelines developed by the U.S. Department of Justice, Justice Management Division, Security and Emergency Planning Staff, ADP/Telecommunications Group. The National Institute of St...

Publications IR 4378 (Final) August 1, 1990
https://csrc.nist.gov/pubs/ir/4378/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) presents the Federal Aviation Administration's Automated Information System Security Accreditation Guidelines. This document provides procedures for the preparation of documentation for the security accreditation of auto...

Publications IR 4267 (Final) July 1, 1990
https://csrc.nist.gov/pubs/ir/4267/final

Abstract: [NISTIR 90-4267] This report describes a conformance test for the Fiber Distributed Data Interface (FDDI) Medium Access Control (MAC) standard [1]. FDDI is a layered OSI protocol consisting of four sublayers at the data link or physical layers as illustrated in Figure 1. At the lowest level is...

Publications IR 4362 (Final) June 1, 1990
https://csrc.nist.gov/pubs/ir/4362/final

Abstract: On May 30 and 31, 1990 the Protocol Security Group at NIST held a Workshop on Security Labels. Thirty-Five representatives from the U.S. Government, industry, and the United Kingdom gathered for two days to discuss security Labels for open systems. The discussion went from the generalities of labels...

Publications IR 4325 (Final) May 1, 1990
https://csrc.nist.gov/pubs/ir/4325/final

Abstract: This National Institute of Standards and Technology Interagency Report (NISTIR) presents a risk assessment methodology developed by the U.S. Department of Energy. This NISTIR contains Volume I: DOE Risk Assessment Guideline Instructions. Resource Table, and Completed Sample and Volume II: DOE Risk A...

Publications IR 4250 (Final) February 1, 1990
https://csrc.nist.gov/pubs/ir/4250/final

Abstract: The SP3 Protocol is one of a number of protocols defined under the United States Government SDNS (Secure Data Network System) activity. The purpose of this protocol is to provide various security services, through the use of cryptographic mechanisms. This document defines the services provided by th...

Publications Conference Paper (Final) December 5, 1988
https://csrc.nist.gov/pubs/conference/1988/12/05/expert-assistance-for-manipulation-of-sgml-dtds/final

Conference: DocProcess88: Conference on Document Processing Systems Abstract: The DTD editing tool is a window and icon based tool for creation, manipulation and comprehension of SGML Document Type Definitions (DTDs). This tool allows users to manipulate SGML DTDs without any knowledge of the rather complex SGML syntax. More generally, the tool allows users to manipulate cont...

Publications Journal Article (Final) October 1, 1988
https://csrc.nist.gov/pubs/journal/1988/10/accuracy-integrity-and-security-in-computerized-vo/final

Journal: Communications of the ACM Abstract: The following excerpts have been gleaned from a 130-page report of potential inaccuracies and fraud in computerized voting systems. Recent difficulties in automated vote-tallying, including specific legal cases, are detailed along with a summary of conclusions and recommendations.

Publications FIPS 46-1 (Final) (Withdrawn) January 22, 1988

https://csrc.nist.gov/pubs/fips/46-1/final

Abstract: The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that...

<< first   < previous   84     85     86     87     88     89     90     91     92     93     94     95     96     97     98     99     100     101     102     103     104     105     106     107     108  next >  last >>