The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Common Criteria 2

CSE, SCSSI, BSI, NLNCSA, CESG, NIST, NSA

The CC combines the best aspects of existing criteria for the security evaluation of information technology systems and products.

Added 2002-07-26


Synthetic Economies: The Application of Distributed Interactive Computing Environments for Policy and Management Decision Making

Richard White, Alok Chaturvedi, Edward F. Smith, Robert Clover, Shailendra Mehta, Chandrajit Bajaj

This paper explains how distributed, interactive computing can be used to assist decision makers to investigate alternative courses of action in complex, dynamic businesses and policy environments.  The military\‘s use of computer-generated synthetic battlefields for training is the metaphor; the creation of synthetic economies within which to practice policy and management prerogatives is the goal. Wxposition proceeds by example, while methodological excursions and underlying theory are provided in supporting appendices.

Added 2002-07-26



Computer Investigations Training Program

Defense Computer Investigations Training Program
Added 2002-07-26

White Paper: The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63

Download: PDF

This White Paper explains key elements of the Clinton Administration\‘s policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and public sectors. It will also be used in U.S. Government professional education institutions, such as the National Defense University and the National Foreign Affairs Training Center, for coursework and exercises on iteragency practices and procedures. Wide dissemination of this unclassified White Paper is encouraged by all agencies of the U.S. Government.

Added 2002-07-26

Hewlett-Packard IDS/9000

Information Security Magazine
Added 2002-07-26

Security of the distributed electronic patient record: a case-based approach to identifying policy issues

James G. Anderson

The growth of managed care and integrated delivery systems has created a new commodity, health information and the technology that it requires. Surveys by Deloitte and Touche indicate that over half of the hospitals in the US are in the process of implementing electronic patient record (EPR) systems. The National Research Counsil has established that industry spends as much as $15 billion on information technology (IT), an amount that is xpanding by 20% per year. The importance of collecting, electronically storing, and using the information is undisputed. This information is needed by consumers to make informed choices; by physicians to provide appropriate quality clinical care; and by health plans to assess outcomes, control costs and monitor quality. The collection, storage and communication of a large variety of personal patient data, however, present a major dilemma. How can we provide the data required by the new forms of health care delivery and at the same time protect the personal privacy of patients? Recent debates concerning medical privacy legislation, software regulation, and telemedicin suggest that this dilemma eill not be easily resolved. The problem is systematic and arises out of the routine use and flow of information throughout the health industry. Health care information is primarily transferred among authorized users. Not only is the information used for patient care and financial reimbursement, secondary users of the information include medical, nursing, and allied health education, research, social services, public health, regulation, litigation, and commercial purposes such as the development of new medical technology and marketing. The main threats to privacy and confidentiality arise from within the institutions that provide patient care as well as institutions that have access to patient data for secondary purposes.

Added 2002-07-26

Clinical Information Systems

James G. Andersen
Added 2002-07-26

1997 Computer Crime and Security Survey

Victoria Police, Office of Strategic Crime Assessments
Added 2002-07-26

Proceedings of BSDCon 2002

Added 2002-07-26

Halted Firewalls

Mike Murray
Added 2002-07-26


Defending Against Distributed Denial-of-service Attacks with Server-centric Router Throttles

David K. Y. Yau and John C. S. Lui and Feng Liang
Added 2002-07-26