Dec 312017
Various Computer Security Related Papers. | |||
---|---|---|---|
File Name | File Size | Zip Size | Zip Type |
ADDEND88.TXT | 7168 | 3008 | deflated |
ADDEND88.WP5 | 7629 | 3471 | deflated |
FIPS.TXT | 80896 | 20676 | deflated |
FIPS.WP5 | 81184 | 21421 | deflated |
LIST88.TXT | 74752 | 22934 | deflated |
LIST88.WP5 | 80492 | 23373 | deflated |
LIST91.TXT | 42112 | 12704 | deflated |
LIST91.WP5 | 42283 | 13166 | deflated |
MANUALS.TXT | 9216 | 1719 | deflated |
MANUALS.WP5 | 9783 | 2323 | deflated |
ORGS.TXT | 9216 | 3627 | deflated |
ORGS.WP5 | 9783 | 4176 | deflated |
REPORTS.TXT | 63488 | 9425 | deflated |
REPORTS.WP5 | 63334 | 10335 | deflated |
TECHPAP.TXT | 50176 | 8837 | deflated |
TECHPAP.WP5 | 49978 | 9683 | deflated |
Download File CSP.ZIP Here
Contents of the ADDEND88.TXT file
ADDENDUM FOR
COMPUTER SYSTEMS PUBLICATIONS LIST 88
Computer Security
NIST SPEC PUB
500-168
REPORT OF THE INVITATIONAL WORKSHOP ON DATA
INTEGRITY
By Zella G. Ruthberg and William T. Polk
September 1989 SN 003-003-02966-1
Order from GPO
This report contains the proceedings of the second
invitational workshop on computer integrity issues
which took place on January 25-27, 1989 at NIST.
The first invitational workshop took place in
October 1987 and addressed integrity policy in
computer information systems; proceedings were
published as NIST Special Publication 500-160. This
follow-on workshop focused on data integrity models,
data quality, integrity controls, and certification
of transformation procedures that preserve data
integrity.
NIST SPEC PUB
500-166COMPUTER VIRUSES AND RELATED THREATS: A MANAGEMENT
GUIDE
By John P. Wack and Lisa J. Carnahan
August 1989 SN 003-003-02955-6 $2.50
Order from GPO
This document contains guidance for managing the
threats of computer viruses and related software and
unauthorized use. It is geared towards managers of
end-user groups, managers dealing with multi-user
systems, personal computers and networks. The
guidance is general and addresses the
vulnerabilities that are most likely to be
exploited.
Data Management Technology
NIST SPEC PUB
500-167INFORMATION MANAGEMENT DIRECTIONS: THE INTEGRATION
CHALLENGE
Elizabeth N. Fong and Alan H. Goldfine, Editors
September 1989 SN 003-003-02973-4
Order from GPO
This report constitutes the proceedings of a three-
day workshop on Information Management Directions
held in Fort Lauderdale, FL on October 31-November
2, 1988. NCSL sponsored the workshop in cooperation
with the Association for Computing Machinery (ACM),
the IEEE Computer Society, and the Federal Data
Management Users Group. The workshop focused on
issues related to integration and productivity.
NBSIR 88-3701
(supersedes
NBSIR 85-3165)USING THE INFORMATION RESOURCE DICTIONARY SYSTEM
COMMAND LANGUAGE (Second Edition)
By Alan Goldfine
January 1988 PB 88169545 $15.95
Order from NTIS
This document introduces and provides examples of
the Command Language of the Information Resource
Dictionary System (IRDS). A dictionary maintained
by the U.S. Air Force is defined in the IRDS and
used as a continuing example throughout the
document. The dictionary is populated, manipulated,
and reported on using the precise syntax of the
Command Language.
NBSIR 88-3700
(supersedes
NBSIR 85-3164)A TECHNICAL OVERVIEW OF THE INFORMATION RESOURCE
DICTIONARY SYSTEM (Second Edition)
By Alan Goldfine and Patricia Konig
January 1988 PB 88163779 $21.95
Order from NTIS
This publication provides a technical overview of
the computer software specifications for an
Information Resource Dictionary System (IRDS). It
summarizes the data architecture and the software
functions and processes of the IRDS. This overview
also provides background information on the
development of the IRDS software specifications
networks.
Networks
NIST SPEC PUB
500-163GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE
USERS' GUIDE
By Tim Boland
August 1989 PB 90-111212 $23.00
Order from NTIS
This publication assists federal agencies in
planning for the introduction of Government Open
Systems Interconnection Profile (GOSIP)-compliant
products into the workplace. For use by federal
procurement specialists, technical specialists, and
managers, the guide provides tutorial information on
Open Systems Interconnection (OSI) protocols as wellas information on OSI registration, OSI procurement,
GOSIP technical evaluation, and GOSIP transition
strategies.
NISTIR 89-4160TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI)
PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK
(ISDN)
by Carol A. Edgar August 1989 PB 89235576 $13.95
Order from NTIS
This report contains the results of a trial
demonstration of OSI protocols over ISDN. NIST
organized the trial to demonstrate the use of ISDN
as a lower layer technology for OSI applications.
The trial was a necessary first step for including
ISDN as a lower layer technology in the Government
Open Systems Interconnection Profile (GOSIP) Version
2.
NISTIR 89-4140WORKING IMPLEMENTATION AGREEMENTS FOR OPEN SYSTEM
INTERCONNECTION PROTOCOLS
Tim Boland, Editor
September 1989 PB 89235931 $36.95
Order from NTIS
This publication records working implementation
specification agreements of OSI protocols among the
organizations participating in the NIST Workshop for
Implementors for OSI Plenary Assembly held June 16,
1989. This work may be the basis of future stable
agreements; the current version of the stable
agreements is contained in NIST Special Publication
500-162.
Software Development and Management
NIST SPEC PUB
500-165SOFTWARE VERIFICATION AND VALIDATION: ITS ROLE IN
COMPUTER ASSURANCE AND ITS RELATIONSHIP WITH
SOFTWARE PROJECT MANAGEMENT STANDARDS
By Dolores R. Wallace and Roger U. Fujii
September 1989 SN 003-003-02959-9 $2.25
Order from GPO
This publication describes how software verification
and validation methodology and standards provide a
strong framework for developing quality software.
Software verification and validation is a broad
systems engineering approach to ensure software
quality and gain optimum software performance. The
approach supports the requirements for project
management and quality assurance and, when used with
other software engineering standards, helps to
produce secure, reliable, and maintainable software
programs.
System Selection and Evaluation
NISTIR 89-4128PROCESSING RATE SENSITIVITIES OF A HETEROGENEOUS
MULTIPROCESSOR
By Gordon Lyon
August 1989 PB 89229017 $13.95
Order from NTIS
A simple performance estimator and alternate
scheduling schemes can, from very modest effort,
highlight some first-order improvement tradeoffs in
multiprocessors. An application example of a
quicksort is used to demonstrate the approach.
NISTIR 89-4053ARCHITECTURALLY FOCUSED BENCHMARKS WITH A
COMMUNICATION EXAMPLE
By G.E. Lyon and R.D. Snelick
March 1989 PB 89216477 $13.95
Order from NTIS
This publication sketches a framework of modalities
for an architecturally focused performance
evaluation. The result is a hybrid of benchmarking
and modeling; elements of capacity-and-use trees,
CUTS, are explored as a simplified notation. A
description of the structure and preliminary results
from a practical benchmark set for process
communication are also given.
December 31, 2017
Add comments