NIST logo

Publications Portal

You searched on: Author: david kuhn

Displaying records 51 to 60 of 112 records.
Resort by: Date / Title

51. Adding Attributes to Role Based Access Control
Published: 6/1/2010
Authors: David R Kuhn, Edward Coyne, Timothy Weil
Abstract: Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine ...

52. Data Loss Prevention
Published: 3/29/2010
Authors: Simon Liu, David R Kuhn
Abstract: In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices ...

53. Practical Interdomain Routing Security
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...

54. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Published: 10/16/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...

55. A Combinatorial Approach to Building Navigation Graphs for Dynamic Web Applications
Published: 9/20/2009
Authors: Raghu N Kacker, David R Kuhn, James F Lawrence, Wenhua Wang, Yu Lei, Sreedevi Sampath
Abstract: Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt with: (1) the page explosion problem, i.e., the number of dynamic pages m ...

56. Combinatorial Software Testing
Published: 8/7/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei, Justin Hunter
Abstract: Developers of large data-intensive software often notice an interesting - though not surprising - phenomenon: when usage of an application jumps dramatically, components that have operated for months without trouble suddenly develop previously unde ...

57. Understanding Insecure IT: Practical Risk Assessment
Published: 5/27/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch Man ...

58. Surviving Insecure IT: Effective Patch Management
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...

59. Introducing "Insecure IT"
Published: 1/20/2009
Authors: David R Kuhn, Hart Rossman, Simon Liu
Abstract: This article introduces a new department for IT Professional that will cover security in IT systems, ranging from desktops to global e-commerce networks. Our goal is to offer ideas to improve IT security, both by looking at ways it can go wrong as we ...

60. Property Verification for Generic Access Control Models
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series