National Computer Security Center (NSA) |
Document Title | Reference # or Description |
Guide to Understanding Trusted Facility Management |
NCSC TG-015 06/89 |
Guide to Writing the Security Features Users Guide for Trusted Systems |
NCSC-TG 026; 09/91 |
Guidelines for Formal Verification Systems |
NCSC TG-014; 04/89 |
Rating Maintenance Phase Program |
NCSC TG-013; 06/89 |
Trusted Database Management System Interpretation |
NCSC-TG 021; 04/91 |
Trusted Network Interpretation |
NCSC TG-005; 11/87 |
Trusted Network Interpretation Environments Guideline |
NCSC-TG 008; 12/88 |
Trusted Product Evaluation Questionnaire |
NCSC-TG 019; 05/92 |
Trusted Product Evaluations |
NCSC-TG 002; 03/88 |
Understanding Trusted Distribution |
NCSC-TG 011; 08/90 |
Writing Trusted Facility Manuals |
NCSC-TG 016; 10/92 |
National Insitute of Standards and Training |
Document Title | Reference # or Description |
Assessing Federal and Commercial Information Security Needs |
NISTIR 4976; 11/92 |
Computer and Information Security Policy - Draft |
NIST 1993 |
Computer Security Considerations in Federal Procurements |
NIST SP 800-04; 03/92 |
Computer User's Guide to the Protection of Information |
NIST 1989 |
Contingency Planning Guide for Information Technology Systems |
NIST SP 800-34 2001 |
Data Encryption Standards (DES) Fact Sheet |
NIST 1990 |
Fact Sheet of Digital Encryption Standard |
NIST; 05/94 |
Identification and Authorization Draft |
NIST 1991 |
Implementing and Access Control Strategy with Smart Token Technology |
NIST 04/89 |
Key Management Validation Systems (KMVS) |
NIST 01/92 |
Logical Access Control Draft |
NIST 1991 |
NIST Computer Security Handbook Cryptography Draft |
NIST 1991 |
NIST Mac Validation System (MVS) Successful Validations |
NIST; 03/93 |
Sample Statements of Work for Federal Computer Security Services: For Use In-House or Contracting Out |
NIST 06/92 |
Secure Data Network System Transport Protocol |
NISTIR 90-4228 |
Security Functionality Standards |
NIST; 01/92 |
Security Program Management Draft |
NIST 1991 |
Threat Assessment of Malicious Code and Human Computer Threats |
NISTIR 4939; 10/92 |
Document Title | Reference # or Description |