Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1501 - 1521 of 1521

Technology Assessment: Methods for Measuring the Level of Computer Security

October 1, 1985
Author(s)
William Neugent, John Gilligan, Lance Hoffman, Zella G. Ruthberg
This technology assessment constitutes a summary and assessment of methods for measuring the level of computer security in computer applications, systems, and installations. The initial draft report for this document was produced in June 1981 for the

Security of Personal Computer Systems: A Management Guide

January 1, 1985
Author(s)
Dennis D. Steinauer
The use of personal computer systems (often called desktop or professional computers) in the office and home environment has placed increasingly powerful information system technology in the hands of growing numbers of users. While providing many benefits

Executive Guide to ADP Contingency Planning

January 1, 1982
Author(s)
James K. Shaw, Stuart W. Katzke
This document provides, in the form of questions and answers, the background and basic essential information required to understand the developmental process for Automatic Data Processing (ADP) contingency plans. The primary intended audience consists of

Guidelines for Implementing and Using the NBS Data Encryption Standard

April 1, 1981
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
[Withdrawn May 19, 2005] The Data Encryption Standard (DES) was published as Federal Information Processing Standards Publication (FIPS PUB) 46 on January 15, 1977. The DES specifies a cryptographic algorithm for protecting computer data. FIPS PUB 81

DES Modes of Operation [includes Change Notice of May 31, 1996]

December 2, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
[Withdrawn May 19, 2005] The Federal Data Encryption Standard (DES) (FIPS 46) specifies a cryptographic algorithm to be used for the cryptographic protection of sensitive, but unclassified, computer data. This FIPS defines four modes of operation for the

Guideline on User Authentication Techniques for Computer Network Access Control

September 29, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
[Withdrawn February 8, 2005] This Guideline provides information and guidance to Federal agencies on techniques and practices which can be used to control access to computer resources via remote terminals and networks. A variety of methods are described

Guidelines for Security of Computer Applications

June 30, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
[Withdrawn February 8, 2005] Security decisions should be an integral part of the entire planning, development, and operation of a computer application. This guideline describes the technical and managerial decisions that should be made in order to assure

A Survey of Remote Monitoring

January 1, 1979
Author(s)
G J. Nutt
This report describes remote monitoring in the application areas of performance evaluation, diagnostic testing, performance assurance and system security testing. The evolution of remote monitoring is briefly reviewed and, then, remote monitors are

Effective Use of Computing Technology in Vote-Tallying

April 1, 1978
Author(s)
Roy Saltman
The results of a systems analysis and evaluation conducted on the role of automatic digital processing in vote-tallying are presented. Included in the report are descriptions of hardware, software, and administrative problems encountered in fourteen

Design Alternatives for Computer Network Security

January 1, 1978
Author(s)
Gerald D. Cole, Dennis K. Branstad
The security problems associated with a network of computers are an extension of those of stand-alone computer systems, but require additional security controls due to the distributed and autonomous nature of the network components. The purpose of this

Performance Assurance and Data Integrity Practices

January 1, 1978
Author(s)
Robert L. Patrick, Robert P. Blanc
This report identifies the approaches and techniques now practiced for detecting, and when possible, correcting malperformance as it occurs in computer information systems. This report is addressed to two audiences: to the systems designer using stock

Audit and Evaluation of Computer Security

October 1, 1977
Author(s)
Zella G. Ruthberg, Robert G. McKenzie
The National Bureau of Standards, with the support of the U.S. General Accounting Office, sponsored an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March 22-24, 1977. Its purpose was to explore the

An Analysis Framework and Additive Software Analysis

Author(s)
Paul E. Black
We present a framework for software assurance, in addition to an additive software analysis approach. Both have the potential to dramatically reduce software vulnerabilities within the next seven years. The framework (1) aggregates tool outputs, (2) allows
Displaying 1501 - 1521 of 1521
Was this page helpful?