NIST logo

Publications Portal

You searched on:
Author: david kuhn

Displaying records 51 to 60 of 96 records.
Resort by: Date / Title


51. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role Based Access Control"
Published: 12/12/2007
Authors: David F Ferraiolo, David R Kuhn, R. Sandhu
Abstract: [This is a response to comments on INCITS Standard 359-2004, Role Based Access Control. For original paper see Ninghui Li et al., IEEE Security & Privacy, vol. 5, no. 6, p.41, (2007).] Some notion of roles for access control predates the research ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150626

52. IPOG/IPOG-D: Efficient Test Generation for Multi-way Combinatorial Testing
Published: 11/29/2007
Authors: Yu Lei, Raghu N Kacker, David R Kuhn, Vadim Okun, James F Lawrence
Abstract: We present two strategies for multi-way testing (i.e., t-way testing with t > 2). The first strategy generalizes an existing strategy, called In-Parameter-Order, from pairwise testing to multi-way testing. This strategy requires all t-way combination ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50964

53. IPOG: A General Strategy for t-Way Software Testing
Published: 8/1/2007
Authors: Yu Lei, Raghu N Kacker, David R Kuhn, Vadim Okun, James F Lawrence
Abstract: Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can also be caused by interactions involving more than two parameters. In t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50944

54. Border Gateway Protocol Security
Series: Special Publication (NIST SP)
Report Number: 800-54
Published: 7/17/2007
Authors: David R Kuhn, Kotikalapudi Sriram, Douglas C Montgomery
Abstract: This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all cu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51195

55. Role-Based Access Control, Second Edition
Published: 12/31/2006
Authors: David F Ferraiolo, David R Kuhn, Ramaswamy Chandramouli
Abstract: [ISBN-13: 978-1-59693-113-8] This newly revised edition of "Role-Based Access Control" offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916555

56. Study of BGP Peering Session Attacks and Their Impacts or Performance
Published: 10/28/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51338

57. Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
Published: 10/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic Au ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151151

58. Assessment of Access Control Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7316
Published: 9/29/2006
Authors: Chung Tong Hu, David F Ferraiolo, David R Kuhn
Abstract: Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple passwor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50886

59. The Computational Complexity of Enforceability Validation for Generic Access Control Rules
Published: 6/14/2006
Authors: Chung Tong Hu, David R Kuhn, David F Ferraiolo
Abstract: In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified system. One issue that must be considered is the efficiency of such sy ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50452

60. An Algorithm for Generating Very Large Covering Arrays
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7308
Published: 4/19/2006
Author: David R Kuhn
Abstract: This note describes a covering array algorithm that can be parallelized, making it possible to handle a much larger number of variables than other know algorithms. The algorithm trades test case optimization for speed ? it produces roughly 3% to 15% ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150637



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series