NIST logo

Publications Portal

You searched on: Author: david kuhn

Displaying records 81 to 90 of 108 records.
Resort by: Date / Title


81. Cost Effective Use of Formal Methods in Verification and Validation Foundations
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli, R W Butler
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expens ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50742

82. Cost Effective Uses of Formal Methods in Verification and Validation
Published: 10/1/2002
Authors: David R Kuhn, Ramaswamy Chandramouli
Abstract: Formal methods offer the promise of significant improvements in verification and validation, and may be the only approach capable of demonstrating the absence of undesirable system behavior. But it is widely recognized that these methods are expensi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151272

83. Security for Telecommuting and Broadband Communications
Series: Special Publication (NIST SP)
Report Number: 800-46
Published: 8/1/2002
Authors: David R Kuhn, Miles C. Tracy, Sheila E Frankel
Abstract: [Superseded by SP 800-46 Rev. 1 (June 2009): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685] This document introduces broadband communication technologies, and the security considerations associated with them. It discusses the u ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151263

84. Quantum Computing and Communication
Published: 6/28/2002
Authors: Paul E Black, David R Kuhn, Carl J Williams
Abstract: A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51022

85. Failure Modes in Medical Device Software: an Analysis of 15 Years of Recall Data
Published: 12/5/2001
Authors: Dolores R. Wallace, David R Kuhn
Abstract: Most complex systems today contain software, and systems failures activated by software faults can provide lessons for software development practices and software quality assurance. This paper presents an analysis of software-related failures of medi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917180

86. A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
Report Number: 6741
Published: 6/13/2001
Author: David R Kuhn
Abstract: This paper presents a hybrid cryptographic protocol, using quantum and classical resources, for authentication and authorization in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151242

87. PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
Series: Special Publication (NIST SP)
Report Number: 800-24
Published: 4/1/2001
Author: David R Kuhn
Abstract: This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Arc ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151223

88. Introduction to Public Key Technology and the Federal PKI Infrastructure
Series: Special Publication (NIST SP)
Report Number: 800-32
Published: 2/26/2001
Authors: David R Kuhn, Chung Tong Hu, William T Polk, Shu-jen H Chang
Abstract: This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI func ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151247

89. Security for Private Branch Exchange Systems
Series: ITL Bulletin
Published: 8/1/2000
Author: David R Kuhn
Abstract: This document provides an introduction to security for private branch exchange systems (PBXs). The primary audience is agency system administrators and others responsible for the installation and operation of PBX systems. Major threat classes are e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151230

90. The NIST Model for Role-Based Access Control: Towards a Unified Standard
Published: 7/26/2000
Authors: R. Sandhu, David F Ferraiolo, David R Kuhn
Abstract: This paper describes a unified model for role-based access control (RBAC). RBAC is a proven technology for large-scale authorization. However, lack of a standard model results in uncertainty and confusion about its utility and meaning. The NIST model ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916402



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series