Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Lisa J. Carnahan (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 26 - 46 of 46

XML Technologies

September 1, 2000
Author(s)
Mary C. Brady, Carmelo Montanez-Rivera, Richard M. Rivello, Lisa J. Carnahan
An Internet language called the Extensible Markup Language (XML) is rapidly becoming one of the most popular languages in the world. XML is being incorporated into many Internet Web pages and applications; it is particularly useful for those involving

Conformance Testing and Certification Model for Software Specifications

March 1, 1999
Author(s)
Lisa J. Carnahan, Lynne S. Rosenthal, Mark Skall
The use of conformity assessment as a means by which buyers and sellers can communicate requirements and conformance will increase as information technology systems and applications grow more complex. Models for conformance testing and certification

Metrology for Information Technology (IT)

January 1, 1997
Author(s)
Lisa Carnahan, M M. Gray, Michael Hogan, Ted Hopp, Jeffrey Horlick, Gordon E. Lyon, Elena R. Messina
The scope of this white paper is the testing or measuring of digital information technology (IT) systems attributes or proporties; the use of digitial IT systems in testing and measuring; and the underlying mathematical, computational, and statistical

Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls

December 1, 1994
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides an overview of the Internet and security-related problems. It then provides an overview of firewall components and the general reasoning behind firewall usage. Several types of network access policies are described, as well as

Guideline for the Analysis of Local Area Network Security

November 9, 1994
Author(s)
National Institute of Standards and Technology (NIST), Lisa Carnahan, Shu-jen H. Chang
[Withdrawn October 19, 2015] This guideline discusses threats and vulnerabilities and considers technical security services and security mechanisms.

Security in Open Systems

July 1, 1994
Author(s)
Robert H. Bagwill, John Barkley, Lisa J. Carnahan, Shu-jen H. Chang, David R. Kuhn, Paul Markovitz, Anastase Nakassis, Karen J. Olsen, Michael L. Ransom, John P. Wack
The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and

Computer Viruses and Related Threats: A Management Guide

August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies