Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1351 - 1375 of 1431

Guideline for the Use of Advanced Authentication Technology Alternatives

September 28, 1994
Author(s)
James F. Dray Jr.
[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which

Standard Security Label for Information Transfer

September 6, 1994
Author(s)
N Nazario
[Withdrawn October 19, 2015] Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated between open systems. Information on a security label can be used to control access, specify

Security in Open Systems

July 1, 1994
Author(s)
Robert H. Bagwill, John Barkley, Lisa J. Carnahan, Shu-jen H. Chang, David R. Kuhn, Paul Markovitz, Anastase Nakassis, Karen J. Olsen, Michael L. Ransom, John P. Wack
The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and

Report of the NIST Workshop on Key Escrow Encryption

June 1, 1994
Author(s)
A Oldehoeft, Dennis K. Branstad
On June 10, 1994, the National Institute of Standards and Technology (NIST) hosted a one-day workshop to present and discuss key escrow encryption technology, including the recently-approved Escrowed Encryption Standard (EES), Federal Information

Escrowed Encryption Standard

February 9, 1994
Author(s)
Miles E. Smid
[Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be implemented in electronic devices and used for protecting government telecommunications when such

Automated Password Generator (APG)

October 5, 1993
Author(s)
Charles Dinkel
[Withdrawn on October 19, 2015] The Automated Password Generator Standard specifies an algorithm to generate passwords for the protection of computer resources. This standard is for use in conjunction with FIPS PUB 112, Password Usage Standard, which

Security Issues in the Database Language SQL

August 2, 1993
Author(s)
William T. Polk, Lawrence E. Bassham
The Database Language SQL (SQL) is a standard interface for accessing and manipulating relational databases. An SQL-compliant database management system (DBMS) will include a minimum level of functionality in a variety of areas. However, many additional

Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992

May 1, 1993
Author(s)
A Oldehoeft
The Workshop on NSFNET/NREN Security was hosted by NIST and sponsored by NSF to address the need for improving the security of national computer networks. Emphasis was on identifying off-the-shelf security technology that could be implemented in the NSF

Minimum Security Requirements for Multi-User Operating Systems

March 1, 1993
Author(s)
David F. Ferraiolo, N Lynch, Patricia R. Toth
[NOTE: THIS DOCUMENT HAS BEEN SUPERSEDED BY THE FEDERAL CRITERIA.] The Minimum Security Requirements for Multi-User Operating Systems (MSR) document provides basic commercial computer system security requirements applicable to both government and

A Guide to the Selection of Anti-Virus Tools and Techniques

December 1, 1992
Author(s)
William T. Polk, Lawrence E. Bassham
Computer viruses continue to pose a threat to the integrity and availability of computer systems. This is especially true for users of personal computers. A variety of anti-virus tools are now available to help manage this threat. These tools use a wide

Automated Tools for Testing Computer System Vulnerability

December 1, 1992
Author(s)
William T. Polk
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these

Assessing Federal and Commercial Information Security Needs (IT)

November 1, 1992
Author(s)
David F. Ferraiolo, D M. Gilbert, N Lynch
In a cooperative effort with government and industry, the National Institute of Standards and Technology (NIST) conducted a study to assess the current and future information technology (IT) security needs of the commercial, civil, and military sectors

Role-Based Access Controls

October 13, 1992
Author(s)
David F. Ferraiolo, David R. Kuhn
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that
Displaying 1351 - 1375 of 1431