NIST logo

Publications Portal

You searched on: Author: david kuhn

Displaying records 61 to 70 of 105 records.
Resort by: Date / Title


61. Role-Based Access Control, Second Edition
Published: 12/31/2006
Authors: David F Ferraiolo, David R Kuhn, Ramaswamy Chandramouli
Abstract: [ISBN-13: 978-1-59693-113-8] This newly revised edition of "Role-Based Access Control" offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916555

62. Study of BGP Peering Session Attacks and Their Impacts or Performance
Published: 10/28/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51338

63. Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
Published: 10/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic Au ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151151

64. Assessment of Access Control Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7316
Published: 9/29/2006
Authors: Chung Tong Hu, David F Ferraiolo, David R Kuhn
Abstract: Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple passwor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50886

65. The Computational Complexity of Enforceability Validation for Generic Access Control Rules
Published: 6/14/2006
Authors: Chung Tong Hu, David R Kuhn, David F Ferraiolo
Abstract: In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified system. One issue that must be considered is the efficiency of such sy ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50452

66. Pseudo-Exhaustive Testing for Software
Published: 4/28/2006
Authors: David R Kuhn, Vadim Okun
Abstract: Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes advantage of two relatively recent advances in software engineering: algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917175

67. An Algorithm for Generating Very Large Covering Arrays
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7308
Published: 4/19/2006
Author: David R Kuhn
Abstract: This note describes a covering array algorithm that can be parallelized, making it possible to handle a much larger number of variables than other know algorithms. The algorithm trades test case optimization for speed ? it produces roughly 3% to 15% ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150637

68. Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation
Published: 4/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session att ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150120

69. Securing Voice Over IP Networks
Published: 5/27/2005
Authors: T J Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150237

70. Characterizing the Risks and Costs of BGP Insecurity/Security
Published: 3/1/2005
Authors: Douglas C Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150197



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series