Reports and Papers Archive
Next Generation Intrusion Detection Expert System (NIDES)
Teaching Engineering Ethics: A Case Study Approach
Computer System Dependability: An Introduction
Knowledge-Based Intrusion Detection
Learning How to Characterize Normal Behavior in Local Area Networks
A Network of Firewalls: An Implementation Example
NIST Computer Security Program Overview
Kerberos: An Authentication Service for Computer Network
Management Guide to Software Reuse
This document, the second in a series on software reuse, focuses on the improvement of productivity and quality of software as well as the reduction of software risks. Software reusability can provide substantial economic benefits. Initial reusability efforts should emphasize an understanding of the concept of software reuse, and encourage the use of existing well-developed software specifications, designs, methods, techniques, tools, and other reusable information. This report presents general management guidance in software reuse. While there is no magic solution to the problem pf achieving the goals of software reuse, economic reasons of software reuse, and identifies those techniques and characteristics which will assist management in improving software reuse.
A Head Start on Assurance
The purpose of the Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness was to identify crucial issues on assurance in IT systems and to provide input into development of policy guidance on determining the type and level of assurance appropriate in a given environment. The readers of these proceedings include those who handle sensitive information involving national security, privacy, commercial value, integrity, and availability. Existing IT security policy guidance is based on computer and communications architectures of the early 1980s. Technological changes since that time mandate a review and revision of policy guidance on assurance and trustworthiness, especially since the changes encompass such technologies as distributed systems, local area networks, the worldwide Internet, policy-enforcing applications, and public key cryptography.

