Federal Information Processing Standards |
Document Title | Reference # or Description |
Guideline for the use of Advanced Authentication Technology Alternatives |
FIPS 190 9/94 |
Guidelines for ADP Contingency Planning |
FIPS 87 3/81 |
Guidelines for Automated Data Processing Physical Security and Risk Management |
FIPS 31 6/74 |
Guidelines for Implementing Using the NBS Data Encryption Standard |
FIPS 74 4/81 |
Guidelines for Password Usage - Password Management Guide |
FIPS 112 5/85 |
Guidelines for Security of Computer Applications |
FIPS 73 6/80 |
Integration Definition for Function Modeling |
FIPS 183 12/93 |
Integration Definition for Information Modeling |
FIPS 184 12/93 |
Key Management Using ANSI X9.17 |
FIPS 171; 04/92 |
Representation of calendar date for Information Interchange |
FIPS 4-2 11/98 |
Secure Hash Standard |
FIPS 180; 05/93 |
Secure Hash Standard Update |
FIPS 180-1; 05/95 |
Secure Hash Standard Update |
FIPS 180-2 8/02 |
Secure Hash Standard w/change notice |
FIPS 180-2 W/CHG 8/02 |
Security Requirements for Cryptographic Modules |
FIPS 140-1 |
Security Requirements for Cryptographic Modules Change Notice |
FIPS 140-2 1/94 |
Spatial Data Transfer Standard |
FIPS 173-1 6/94 |
Standard for Metropolitan Areas... |
FIPS 8-6 3/95 |
Standard Security Label for Information Transfer |
FIPS 188 9/94 |
Standard Security Label for the Government Open Systems Interconnection Profile (Draft) |
FIPS 1992 |
Table of Organizations and Codes - Legislative Branch |
FIPS 95-2 |
The Keyed-Hash Message Authentication Code |
FIPS 198-A 3/02 |
(TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System |
NCSC-TG 020A; 04/91 |
Certification and Accreditation Concepts |
NCSC-TG 029; 01/94 |
Computer Security Subsystems |
NCSC TG-009; 09/88 |
Computer Viruses - Prevention, Detection, and Treatment |
NCSC 1989 |
Guide to Understanding Audit in Trusted Systems |
NCSC TG-001; 07/87 |
Guide to Understanding Configuration Management in Trusted Systems |
NCSC TG-006; 03/88 |
Guide to Understanding Data Remanence in Automated Information Systems |
NCSC TG-025; 09/91 |
Guide to Understanding Design Documentation |
NCSC TG-007 V1 1989 |
Guide to Understanding Discretionary Access Control in Trusted Systems |
NCSC TG-003; 09/87 |
Guide to Understanding Identification and Authentication in Trusted Systems |
NCSC TG-017 V1 1990 |
Document Title | Reference # or Description |