Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: david kuhn

Displaying records 71 to 80 of 114 records.
Resort by: Date / Title

71. Study of BGP Peering Session Attacks and Their Impacts or Performance
Published: 10/28/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn

72. Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
Published: 10/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic Au ...

73. Assessment of Access Control Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7316
Published: 9/29/2006
Authors: Chung Tong Hu, David F Ferraiolo, David R Kuhn
Abstract: Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple passwor ...

74. The Computational Complexity of Enforceability Validation for Generic Access Control Rules
Published: 6/14/2006
Authors: Chung Tong Hu, David R Kuhn, David F Ferraiolo
Abstract: In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified system. One issue that must be considered is the efficiency of such sy ...

75. Pseudo-Exhaustive Testing for Software
Published: 4/28/2006
Authors: David R Kuhn, Vadim Okun
Abstract: Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes advantage of two relatively recent advances in software engineering: algor ...

76. An Algorithm for Generating Very Large Covering Arrays
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7308
Published: 4/19/2006
Author: David R Kuhn
Abstract: This note describes a covering array algorithm that can be parallelized, making it possible to handle a much larger number of variables than other know algorithms. The algorithm trades test case optimization for speed ? it produces roughly 3% to 15% ...

77. Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation
Published: 4/1/2006
Authors: Kotikalapudi Sriram, Douglas C Montgomery, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session att ...

78. Securing Voice Over IP Networks
Published: 5/27/2005
Authors: T J Walsh, David R Kuhn
Abstract: Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibil ...

79. Characterizing the Risks and Costs of BGP Insecurity/Security
Published: 3/1/2005
Authors: Douglas C Montgomery, Kotikalapudi Sriram, Oliver Borchert, Okhee Kim, David R Kuhn
Abstract: We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multi ...

80. Security Considerations for Voice Over IP Systems
Series: Special Publication (NIST SP)
Report Number: 800-58
Published: 1/1/2005
Authors: David R Kuhn, Thomas J. Walsh, S G Fries
Abstract: Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issue ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series