Dec 312017
 
Various Computer Security Related Papers.
File CSP.ZIP from The Programmer’s Corner in
Category Various Text files
Various Computer Security Related Papers.
File Name File Size Zip Size Zip Type
ADDEND88.TXT 7168 3008 deflated
ADDEND88.WP5 7629 3471 deflated
FIPS.TXT 80896 20676 deflated
FIPS.WP5 81184 21421 deflated
LIST88.TXT 74752 22934 deflated
LIST88.WP5 80492 23373 deflated
LIST91.TXT 42112 12704 deflated
LIST91.WP5 42283 13166 deflated
MANUALS.TXT 9216 1719 deflated
MANUALS.WP5 9783 2323 deflated
ORGS.TXT 9216 3627 deflated
ORGS.WP5 9783 4176 deflated
REPORTS.TXT 63488 9425 deflated
REPORTS.WP5 63334 10335 deflated
TECHPAP.TXT 50176 8837 deflated
TECHPAP.WP5 49978 9683 deflated

Download File CSP.ZIP Here

Contents of the ADDEND88.TXT file



ADDENDUM FOR

COMPUTER SYSTEMS PUBLICATIONS LIST 88


Computer Security

NIST SPEC PUB
500-168
REPORT OF THE INVITATIONAL WORKSHOP ON DATA
INTEGRITY
By Zella G. Ruthberg and William T. Polk
September 1989 SN 003-003-02966-1
Order from GPO

This report contains the proceedings of the second
invitational workshop on computer integrity issues
which took place on January 25-27, 1989 at NIST.
The first invitational workshop took place in
October 1987 and addressed integrity policy in
computer information systems; proceedings were
published as NIST Special Publication 500-160. This
follow-on workshop focused on data integrity models,
data quality, integrity controls, and certification
of transformation procedures that preserve data
integrity.
NIST SPEC PUB
500-166COMPUTER VIRUSES AND RELATED THREATS: A MANAGEMENT
GUIDE
By John P. Wack and Lisa J. Carnahan
August 1989 SN 003-003-02955-6 $2.50
Order from GPO

This document contains guidance for managing the
threats of computer viruses and related software and
unauthorized use. It is geared towards managers of
end-user groups, managers dealing with multi-user
systems, personal computers and networks. The
guidance is general and addresses the
vulnerabilities that are most likely to be
exploited.
Data Management Technology

NIST SPEC PUB
500-167INFORMATION MANAGEMENT DIRECTIONS: THE INTEGRATION
CHALLENGE
Elizabeth N. Fong and Alan H. Goldfine, Editors
September 1989 SN 003-003-02973-4
Order from GPO
This report constitutes the proceedings of a three-
day workshop on Information Management Directions
held in Fort Lauderdale, FL on October 31-November
2, 1988. NCSL sponsored the workshop in cooperation
with the Association for Computing Machinery (ACM),
the IEEE Computer Society, and the Federal Data
Management Users Group. The workshop focused on
issues related to integration and productivity.
NBSIR 88-3701
(supersedes
NBSIR 85-3165)USING THE INFORMATION RESOURCE DICTIONARY SYSTEM
COMMAND LANGUAGE (Second Edition)
By Alan Goldfine
January 1988 PB 88169545 $15.95
Order from NTIS

This document introduces and provides examples of
the Command Language of the Information Resource
Dictionary System (IRDS). A dictionary maintained
by the U.S. Air Force is defined in the IRDS and
used as a continuing example throughout the
document. The dictionary is populated, manipulated,
and reported on using the precise syntax of the
Command Language.
NBSIR 88-3700
(supersedes
NBSIR 85-3164)A TECHNICAL OVERVIEW OF THE INFORMATION RESOURCE
DICTIONARY SYSTEM (Second Edition)
By Alan Goldfine and Patricia Konig
January 1988 PB 88163779 $21.95
Order from NTIS

This publication provides a technical overview of
the computer software specifications for an
Information Resource Dictionary System (IRDS). It
summarizes the data architecture and the software
functions and processes of the IRDS. This overview
also provides background information on the
development of the IRDS software specifications
networks.
Networks
NIST SPEC PUB
500-163GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE
USERS' GUIDE
By Tim Boland
August 1989 PB 90-111212 $23.00
Order from NTIS

This publication assists federal agencies in
planning for the introduction of Government Open
Systems Interconnection Profile (GOSIP)-compliant
products into the workplace. For use by federal
procurement specialists, technical specialists, and
managers, the guide provides tutorial information on
Open Systems Interconnection (OSI) protocols as wellas information on OSI registration, OSI procurement,
GOSIP technical evaluation, and GOSIP transition
strategies.

NISTIR 89-4160TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI)
PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK
(ISDN)
by Carol A. Edgar August 1989 PB 89235576 $13.95
Order from NTIS

This report contains the results of a trial
demonstration of OSI protocols over ISDN. NIST
organized the trial to demonstrate the use of ISDN
as a lower layer technology for OSI applications.
The trial was a necessary first step for including
ISDN as a lower layer technology in the Government
Open Systems Interconnection Profile (GOSIP) Version
2.
NISTIR 89-4140WORKING IMPLEMENTATION AGREEMENTS FOR OPEN SYSTEM
INTERCONNECTION PROTOCOLS
Tim Boland, Editor
September 1989 PB 89235931 $36.95
Order from NTIS

This publication records working implementation
specification agreements of OSI protocols among the
organizations participating in the NIST Workshop for
Implementors for OSI Plenary Assembly held June 16,
1989. This work may be the basis of future stable
agreements; the current version of the stable
agreements is contained in NIST Special Publication
500-162.
Software Development and Management

NIST SPEC PUB
500-165SOFTWARE VERIFICATION AND VALIDATION: ITS ROLE IN
COMPUTER ASSURANCE AND ITS RELATIONSHIP WITH
SOFTWARE PROJECT MANAGEMENT STANDARDS
By Dolores R. Wallace and Roger U. Fujii
September 1989 SN 003-003-02959-9 $2.25
Order from GPO

This publication describes how software verification
and validation methodology and standards provide a
strong framework for developing quality software.
Software verification and validation is a broad
systems engineering approach to ensure software
quality and gain optimum software performance. The
approach supports the requirements for project
management and quality assurance and, when used with
other software engineering standards, helps to
produce secure, reliable, and maintainable software
programs.


System Selection and Evaluation

NISTIR 89-4128PROCESSING RATE SENSITIVITIES OF A HETEROGENEOUS
MULTIPROCESSOR
By Gordon Lyon
August 1989 PB 89229017 $13.95
Order from NTIS

A simple performance estimator and alternate
scheduling schemes can, from very modest effort,
highlight some first-order improvement tradeoffs in
multiprocessors. An application example of a
quicksort is used to demonstrate the approach.
NISTIR 89-4053ARCHITECTURALLY FOCUSED BENCHMARKS WITH A
COMMUNICATION EXAMPLE
By G.E. Lyon and R.D. Snelick
March 1989 PB 89216477 $13.95
Order from NTIS

This publication sketches a framework of modalities
for an architecturally focused performance
evaluation. The result is a hybrid of benchmarking
and modeling; elements of capacity-and-use trees,
CUTS, are explored as a simplified notation. A
description of the structure and preliminary results
from a practical benchmark set for process
communication are also given.



 December 31, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)