NIST logo

Publications Portal

You searched on:
Author: david kuhn

Displaying records 61 to 70 of 101 records.
Resort by: Date / Title


61. Assessment of Access Control Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7316
Published: 9/29/2006
Authors: Chung Tong Hu, David F Ferraiolo, David R Kuhn
Abstract: Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple passwor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50886

62. The Computational Complexity of Enforceability Validation for Generic Access Control Rules
Published: 6/14/2006
Authors: Chung Tong Hu, David R Kuhn, David F Ferraiolo
Abstract: In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified system. One issue that must be considered is the efficiency of such sy ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50452

63. Pseudo-Exhaustive Testing for Software
Published: 4/28/2006
Authors: David R Kuhn, Vadim Okun
Abstract: Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes advantage of two relatively recent advances in software engineering: algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917175

64. An Algorithm for Generating Very Large Covering Arrays
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7308
Published: 4/19/2006
Author: David R Kuhn
Abstract: This note describes a covering array algorithm that can be parallelized, making it possible to handle a much larger number of variables than other know algorithms. The algorithm trades test case optimization for speed ? it produces roughly 3% to 15% ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150637

65. Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation
Published: 4/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session att ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150120

66. Securing Voice Over IP Networks
Published: 5/27/2005
Authors: T J Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150237

67. Characterizing the Risks and Costs of BGP Insecurity/Security
Published: 3/1/2005
Authors: Douglas C Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150197

68. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150222

69. Attack vs. Countermeasure Effectiveness (ACE): Modeling Tool for BGP
Published: 11/1/2004
Authors: Kotikalapudi Sriram, Douglas C Montgomery, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150194

70. Incorporating Subjective Risk Vales in BGP Attack Trees
Published: 11/1/2004
Authors: David R Kuhn, Kotikalapudi Sriram, Douglas C Montgomery
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50198



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series