Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1226 - 1250 of 1431

Federal S/MIME V3 Client Profile

November 5, 2002
Author(s)
C M. Chernick
S/MIME (Secure / Multipurpose Internet Mail Extensions) is a set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard and describes a protocol for adding cryptographic security services through MIME

Security for Telecommuting and Broadband Communications

November 1, 2002
Author(s)
Shirley M. Radack
This bulletin summarizes NIST SP 800-46, Security for Telecommuting and Broadband Communications, published September 2002. The report discusses both technical and policy issues, and provides guidance on using personal firewalls, strengthening the security

Systems Administration Guidance for Securing Microsoft Windows 2000 Professional System

November 1, 2002
Author(s)
Murugiah P. Souppaya, Anthony B. Harris, Mark McLarnon, Nikolaos Selimis
The document is intended to assist the users and system administrators of Windows 2000 Professional systems in configuring their hosts by providing configuration templates and security checklists. The guide provides detailed information about the security

Interface-Driven Model-Based Generation of Java Test Drivers

September 3, 2002
Author(s)
Mark Blackburn, Robert Busser, Aaron Nauman, Ramaswamy Chandramouli
This paper extends prior work in model-based verification and describes interface-driven analysis that combines with a requirement model to support automated generation of Java test scripts. It describes concepts of models and test driver mappings using

Cryptographic Standards and Guidance: A Status Report

September 1, 2002
Author(s)
Elaine B. Barker
A comprehensive toolkit of cryptographic standards and associated guideline that covers a wide range of cryptographic technology is currently under development by the Computer Security Division at NIST. These standards and guidelines will enable U.S

Security Guide for Interconnecting Information Technology Systems

September 1, 2002
Author(s)
Timothy Grance, Joan Hash, Steven Peck, Jonathan Smith, Karen Korow-Diks
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, & terminating interconnections between information technology (IT) systems that are owned & operated by different organizations

Setup and Test Procedures dd (GNU Fileutils) 4.0.36 Forensic Tests

August 1, 2002
Author(s)
James R. Lyle
This document describes the testing of dd (GNU fileutils) 4.0.36 as a disk imaging tool on a Linux platform. The Linux version used was Linux version 2.4.2-2 (Red Hat Linux 7.1 2.96-79). The test cases that were applied are described in Disk Imaging Tool

Contingency Planning Guide for Information Technology Systems

June 1, 2002
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes NIST SP 800-34, Contingency Planning Guide for Information Technology Systems. It describes the process of developing contingency plans, procedures, and technical measures that can enable a system to be recovered quickly and

Techniques for System and Data Recovery

April 1, 2002
Author(s)
William E. Burr, Joan Hash
The key asset in Federal agencies today is the information and data used to implement, sustain and maintain critical government programs and operations. Current efforts in ensuring that the United States can recover and restore activities which have great

Planning Report 02-1: The Economic Impact of Role-Based Access Control

March 1, 2002
Author(s)
Michael P. Gallaher, Alan C. O'Connor, Brian Kropp, Gregory C. Tassey
The National Institute of Standards and Technology (NIST) began working on RBAC in the early 1990s after a study of federal agency security needs identified the need to develop a better method for managing large networked systems and complex access issues

Risk Management Guidance for Information Technology Systems

February 26, 2002
Author(s)
Joan Hash
Risk Management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level. Organizations use risk assessment, the first step in the risk management methodology, to determine the extent of the potential
Displaying 1226 - 1250 of 1431