Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1426 - 1450 of 1504

Guideline for the Use of Advanced Authentication Technology Alternatives

September 28, 1994
Author(s)
National Institute of Standards and Technology (NIST), James F. Dray Jr.
[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which

Standard Security Label for Information Transfer

September 6, 1994
Author(s)
National Institute of Standards and Technology (NIST), N Nazario
[Withdrawn October 19, 2015] Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated between open systems. Information on a security label can be used to control access, specify

Security in Open Systems

July 1, 1994
Author(s)
Robert H. Bagwill, John Barkley, Lisa J. Carnahan, Shu-jen H. Chang, David R. Kuhn, Paul Markovitz, Anastase Nakassis, Karen J. Olsen, Michael L. Ransom, John P. Wack
The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and

Report of the NIST Workshop on Key Escrow Encryption

June 1, 1994
Author(s)
A Oldehoeft, Dennis K. Branstad
On June 10, 1994, the National Institute of Standards and Technology (NIST) hosted a one-day workshop to present and discuss key escrow encryption technology, including the recently-approved Escrowed Encryption Standard (EES), Federal Information

Escrowed Encryption Standard

February 9, 1994
Author(s)
National Institute of Standards and Technology (NIST), Miles E. Smid
[Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be implemented in electronic devices and used for protecting government telecommunications when such

Automated Password Generator (APG)

October 5, 1993
Author(s)
National Institute of Standards and Technology (NIST), Charles Dinkel
[Withdrawn on October 19, 2015] The Automated Password Generator Standard specifies an algorithm to generate passwords for the protection of computer resources. This standard is for use in conjunction with FIPS PUB 112, Password Usage Standard, which

Security Issues in the Database Language SQL

August 2, 1993
Author(s)
William T. Polk, Lawrence E. Bassham
The Database Language SQL (SQL) is a standard interface for accessing and manipulating relational databases. An SQL-compliant database management system (DBMS) will include a minimum level of functionality in a variety of areas. However, many additional

Report of the NSF/NIST Workshop on NSFNET/NREN Security, July 6-7, 1992

May 1, 1993
Author(s)
A Oldehoeft
The Workshop on NSFNET/NREN Security was hosted by NIST and sponsored by NSF to address the need for improving the security of national computer networks. Emphasis was on identifying off-the-shelf security technology that could be implemented in the NSF

Minimum Security Requirements for Multi-User Operating Systems

March 1, 1993
Author(s)
David F. Ferraiolo, N Lynch, Patricia R. Toth
[NOTE: THIS DOCUMENT HAS BEEN SUPERSEDED BY THE FEDERAL CRITERIA.] The Minimum Security Requirements for Multi-User Operating Systems (MSR) document provides basic commercial computer system security requirements applicable to both government and

A Guide to the Selection of Anti-Virus Tools and Techniques

December 1, 1992
Author(s)
William T. Polk, Lawrence E. Bassham
Computer viruses continue to pose a threat to the integrity and availability of computer systems. This is especially true for users of personal computers. A variety of anti-virus tools are now available to help manage this threat. These tools use a wide

Automated Tools for Testing Computer System Vulnerability

December 1, 1992
Author(s)
William T. Polk
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these

Assessing Federal and Commercial Information Security Needs (IT)

November 1, 1992
Author(s)
David F. Ferraiolo, D M. Gilbert, N Lynch
In a cooperative effort with government and industry, the National Institute of Standards and Technology (NIST) conducted a study to assess the current and future information technology (IT) security needs of the commercial, civil, and military sectors

Role-Based Access Controls

October 13, 1992
Author(s)
David F. Ferraiolo, David R. Kuhn
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that

Threat Assessment of Malicious Code and External Attacks

October 1, 1992
Author(s)
Lawrence E. Bassham, William T. Polk
As a participant in the U. S. Army Computer Vulnerability/Survivability Study Team, the National Institute of Standards and Technology has been tasked with providing an assessment of the threats associated with commercial hardware and software. This
Displaying 1426 - 1450 of 1504
Was this page helpful?