Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: athanasios karygiannis Sorted by: title

Displaying records 1 to 10 of 17 records.
Resort by: Date / Title

1. A PDA Security Policy Enforcement Tool
Published: 7/9/2002
Authors: Athanasios T Karygiannis, Wayne Jansen, Serban Ilie Gavrila, Vlad Korolev
Abstract: This paper describes a proof-of-concept implementation of a Personal Digital Assistant (PDA) Security Policy Enforcement Tool developed by NIST. This tool can assist enterprise security administrators in setting, updating, monitoring, and enforcing g ...

2. Access Control for SAR Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7815
Published: 7/1/2011
Authors: Stephen Quirolgico, Chung Tong Hu, Athanasios T Karygiannis
Abstract: The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for controlling access to Suspicious Activity Report (SAR) data within the law enforcement domain. Th ...

3. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...

4. Assigning and Enforcing Security Policies on Handheld Devices
Published: 5/1/2002
Authors: Wayne Jansen, Athanasios T Karygiannis, Serban Ilie Gavrila, Vlad Korolev
Abstract: The proliferation of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. While providing productivity benefits, the ability of these devices to store and transmit corpo ...

5. Building Security into Off-the-Shelf Smartphones
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...

6. Electromagnetic Signatures of Wireless Local Area Network Cards: Implementation Issues and Detection in the Presence of Interferers
Published: 12/21/2005
Authors: K. Remley, Robert Johnk, Athanasios T Karygiannis, Emmanouil Antonakakis
Abstract: This work investigates a measurement method for detecting the radio-frequency electromagnetic characteristics of an individual 802.11b wireless local-area network (WLAN) card--its electromagnetic signature--in the presence of an interfering signal. T ...

7. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...

8. Guidelines for Securing Radio Frequency Identification (RFID) Systems
Series: Special Publication (NIST SP)
Report Number: 800-98
Published: 4/6/2007
Authors: Athanasios T Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn, T. Phillips
Abstract: This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a m ...

9. Mobile Agent Security
Series: Special Publication (NIST SP)
Report Number: 800-19
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis
Abstract: Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new h ...

10. Network Security Testing Using Mobile Agents
Published: 3/25/1998
Author: Athanasios T Karygiannis
Abstract: This paper describes a prototype security testing tool that is currently under development at NIST. This prototype tool uses autonomous mobile agents to perform distributed, fault-tolerant, and adaptive network security testing. The security testin ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series