NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Robert H. Bagwill, John Barkley, Lisa J. Carnahan, Shu-jen H. Chang, David R. Kuhn, Paul Markovitz, Anastase Nakassis, Karen J. Olsen, Michael L. Ransom, John P. Wack
Abstract
The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and result in disruptions or degradation of service. To address these threats, NIST is assisting the Office of the Manager, National Communications System (OMNCS), in the areas of computer and network security research and development. NIST is investigating the vulnerabilities and related security issues that result from the use of open systems platforms, i.e., products based on open standards such as POSIX and OSI, in the telecommunications industry. This report is intended to provide information for the practicing programmer involved in development of telecommunications application software. In short, it provides answers to the question, "How do I build security into software based on open system platforms?" It is not intended to be tutorial in nature and assumes some knowledge of open systems and Unix. Many of the references cited are tutorial and may be used to obtain any background information required.
Bagwill, R.
, Barkley, J.
, Carnahan, L.
, Chang, S.
, Kuhn, D.
, Markovitz, P.
, Nakassis, A.
, Olsen, K.
, Ransom, M.
and Wack, J.
(1994),
Security in Open Systems, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD
(Accessed October 11, 2025)