The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Report of the NIST Workshop on Key escrow Encryption

Arthur E. Oldenhoeft, Dennis K. Branstad, ed.
Added 2002-07-26

A Study of Federal Agency Needs for Information Technology Security

Dennis M. Gilbert, U.S. Department of Commerce

In Carrying out its charter to help federal agencies meet thier individual information technology (IT) security requirements, the National Institute of standards and Technology (NIST) must understand what agencies need to meet those requirements.  The initial effort to improve NIST\‘s ability to identify sources of IT security-related requirements and needs, conducting an in-depth study, and establishing ongoing mechanisms to facilitate communiction between NIST and agencies.  Thhe recently conducted study involved interviews with federal agency staff and a survey in which respondents indicated the importance and immediacy of a set three dozen candidate needs.  Study participants, applications, individual perspectives, and data processing environments. The result of the study contribute to a sound basis for plannning future NIST IT security standards, guidance, and related activities.  NIST is committed to developing and documenting a clear understanding of agency needs in this area and to using the documented, validated needs as input to its program. The report documents the study.

Added 2002-07-26

FUZZ Revisited: A Re-examination of Reliability of UNIX Utilities and Services

B.P. Miller,D. Koski,C.P. Lee,V. Maganty,R. Murthy,A. Natarajan,J. Steidl
Added 2002-07-26

Extending Mutation Testing to Find Environmental Bugs

E.H. Spafford

Environmental bugs are bugs caused by limitations of precision or capacity in the nvironment of a piece of software. These bugs may be difficult to activate and even more difficult to find. This paper reports on a n extension to traditional matational testing that enables testing specifically for environmental bugs involving integer arithmetic. This method is both simple and effective, and provides some insight into other possible extensions of mutation testing methodology that can be used to expose environmental bugs.

Added 2002-07-26

Holding Intruders Accountable on the Internet

Stuart Staniford-Chen, L. Todd Heberlein

This paper addresses the problem of tracing intruders who obscure their identity by logging on through a chain of different machines.

Added 2002-07-26

Data and Computer Security: Dictionary of standards concepts and terms

Dennis Longley and Michael Shain
Added 2002-07-26


Interactive High Dimensional Data Visualization

A. Buja,D. Cook,D.F. Swayne
Added 2002-07-26



Drawing Graphs with dot

E. Koutsofios,S.C. north
Added 2002-07-26

Reinforcement Learning

Added 2002-07-26

Guideline for the Analysis of Local Area Network Security

US Department of Commerce
Added 2002-07-26

An Introduction to Computer Security: The NIST Handbook

barbara Guttman, Edward A. Roback

this handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.  It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. The handbook provides a broad overview of computer security to help readers understand their computer security needs and develop a sound approach to the selection of appropriate security controls.  It does not describe detailed steps necessary to implement a computer security program,provide detailed implementation procedures for security controls, or give guidance for auditing the security of specific systems.  General references are provided at teh end of this chapter, and references of \“how-to\” books and articls are provided at the end of each chapter in Part II, II, and IV. the purpose of this handbook is not to specify requirements but, rather, to discuss the benefits of various computer security controls and situations in which their application may be appropriate.  SOme requirements for federal systems are noted in the text.  Thsi document provides advice and guidance; no penaltie are stipulated.

Added 2002-07-26

Security Considerations for SQL-based Implementations of STEP

Lawrence E. Bassham, W. Timothy Polk

the database Language SQL (SQL) is a widely used language for accessing and manipulating relational databases. Assuch, SQL can be of use in many different operational environments, with correspondingly different needs for security.  One specific application of this standard is in Product Data Exchange using STEp (PDES).[PDE93a] This paperexamines the security implications of the versions of the SQL standard as used to implement STEP.  STEP does not imply any particular security policy, so a variety of security policies are examined.  The paper has been written as a companion document to NIST\‘s general SQL security document, Security ISSUES in the Database Language SQL [PB93], and references that document frequently.

Added 2002-07-26