| Federal Information Processing Standards |
| Document Title | Reference # or Description |
| Guideline for the use of Advanced Authentication Technology Alternatives |
FIPS 190 9/94 |
| Guidelines for ADP Contingency Planning |
FIPS 87 3/81 |
| Guidelines for Automated Data Processing Physical Security and Risk Management |
FIPS 31 6/74 |
| Guidelines for Implementing Using the NBS Data Encryption Standard |
FIPS 74 4/81 |
| Guidelines for Password Usage - Password Management Guide |
FIPS 112 5/85 |
| Guidelines for Security of Computer Applications |
FIPS 73 6/80 |
| Integration Definition for Function Modeling |
FIPS 183 12/93 |
| Integration Definition for Information Modeling |
FIPS 184 12/93 |
| Key Management Using ANSI X9.17 |
FIPS 171; 04/92 |
| Representation of calendar date for Information Interchange |
FIPS 4-2 11/98 |
| Secure Hash Standard |
FIPS 180; 05/93 |
| Secure Hash Standard Update |
FIPS 180-1; 05/95 |
| Secure Hash Standard Update |
FIPS 180-2 8/02 |
| Secure Hash Standard w/change notice |
FIPS 180-2 W/CHG 8/02 |
| Security Requirements for Cryptographic Modules |
FIPS 140-1 |
| Security Requirements for Cryptographic Modules Change Notice |
FIPS 140-2 1/94 |
| Spatial Data Transfer Standard |
FIPS 173-1 6/94 |
| Standard for Metropolitan Areas... |
FIPS 8-6 3/95 |
| Standard Security Label for Information Transfer |
FIPS 188 9/94 |
| Standard Security Label for the Government Open Systems Interconnection Profile (Draft) |
FIPS 1992 |
| Table of Organizations and Codes - Legislative Branch |
FIPS 95-2 |
| The Keyed-Hash Message Authentication Code |
FIPS 198-A 3/02 |
| (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System |
NCSC-TG 020A; 04/91 |
| Certification and Accreditation Concepts |
NCSC-TG 029; 01/94 |
| Computer Security Subsystems |
NCSC TG-009; 09/88 |
| Computer Viruses - Prevention, Detection, and Treatment |
NCSC 1989 |
| Guide to Understanding Audit in Trusted Systems |
NCSC TG-001; 07/87 |
| Guide to Understanding Configuration Management in Trusted Systems |
NCSC TG-006; 03/88 |
| Guide to Understanding Data Remanence in Automated Information Systems |
NCSC TG-025; 09/91 |
| Guide to Understanding Design Documentation |
NCSC TG-007 V1 1989 |
| Guide to Understanding Discretionary Access Control in Trusted Systems |
NCSC TG-003; 09/87 |
| Guide to Understanding Identification and Authentication in Trusted Systems |
NCSC TG-017 V1 1990 |
| Document Title | Reference # or Description |