NIST logo

Publications Portal

You searched on:
Author: david kuhn

Displaying records 31 to 40 of 88 records.
Resort by: Date / Title


31. Managing Security: The Security Content Automation Protocol
Published: 2/4/2011
Authors: Shirley M. Radack, David R Kuhn
Abstract: Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously mon ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907372

32. An Application of Combinatorial Methods to Conformance Testing for Document Object Model Events
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7773
Published: 11/1/2010
Authors: Carmelo Montanez-Rivera, David R Kuhn, Mary C Brady, Richard M Rivello, Jenise Reyes Rodriguez, Michael K. Powers
Abstract: This report describes the use of combinatorial test methods to reduce the cost of testing for the Document Object Model Events standard while maintaining an equivalent level of assurance. More than 36,000 tests - all possible combinations of equival ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907846

33. Practical Combinatorial Testing
Series: Special Publication (NIST SP)
Report Number: 800-142
Published: 10/7/2010
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: Combinatorial testing can help detect problems like this early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not every parameter contributes to every fault and most faults are caused by interactions between ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906255

34. Introduction: Cybersecurity
Published: 8/31/2010
Author: David R Kuhn
Abstract: Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905995

35. Vulnerability Trends: Measuring Progress
Published: 7/19/2010
Authors: David R Kuhn, Christopher S. Johnson
Abstract: What is the state of security engineering today? Are we as an industry making progress? What are prospects for the future? To address these questions we analyze data from the National Vulnerability Database (NVD).
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905737

36. Adding Attributes to Role Based Access Control
Published: 6/1/2010
Authors: David R Kuhn, Edward Coyne, Timothy Weil
Abstract: Role based access control [1][2] (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must de ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905425

37. Data Loss Prevention
Published: 3/29/2010
Authors: Simon Liu, David R Kuhn
Abstract: In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904672

38. Practical Interdomain Routing Security
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904041

39. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Published: 10/14/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904044

40. A Combinatorial Approach to Building Navigation Graphs for Dynamic Web Applications
Published: 9/20/2009
Authors: Raghu N Kacker, David R Kuhn, James F Lawrence, Wenhua Wang, Yu Lei, Sreedevi Sampath
Abstract: Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt with: (1) the page explosion problem, i.e., the number of dynamic pages m ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902865



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series