| National Computer Security Center (NSA) |
| Document Title | Reference # or Description |
| Guide to Understanding Trusted Facility Management |
NCSC TG-015 06/89 |
| Guide to Writing the Security Features Users Guide for Trusted Systems |
NCSC-TG 026; 09/91 |
| Guidelines for Formal Verification Systems |
NCSC TG-014; 04/89 |
| Rating Maintenance Phase Program |
NCSC TG-013; 06/89 |
| Trusted Database Management System Interpretation |
NCSC-TG 021; 04/91 |
| Trusted Network Interpretation |
NCSC TG-005; 11/87 |
| Trusted Network Interpretation Environments Guideline |
NCSC-TG 008; 12/88 |
| Trusted Product Evaluation Questionnaire |
NCSC-TG 019; 05/92 |
| Trusted Product Evaluations |
NCSC-TG 002; 03/88 |
| Understanding Trusted Distribution |
NCSC-TG 011; 08/90 |
| Writing Trusted Facility Manuals |
NCSC-TG 016; 10/92 |
| National Insitute of Standards and Training |
| Document Title | Reference # or Description |
| Assessing Federal and Commercial Information Security Needs |
NISTIR 4976; 11/92 |
| Computer and Information Security Policy - Draft |
NIST 1993 |
| Computer Security Considerations in Federal Procurements |
NIST SP 800-04; 03/92 |
| Computer User's Guide to the Protection of Information |
NIST 1989 |
| Contingency Planning Guide for Information Technology Systems |
NIST SP 800-34 2001 |
| Data Encryption Standards (DES) Fact Sheet |
NIST 1990 |
| Fact Sheet of Digital Encryption Standard |
NIST; 05/94 |
| Identification and Authorization Draft |
NIST 1991 |
| Implementing and Access Control Strategy with Smart Token Technology |
NIST 04/89 |
| Key Management Validation Systems (KMVS) |
NIST 01/92 |
| Logical Access Control Draft |
NIST 1991 |
| NIST Computer Security Handbook Cryptography Draft |
NIST 1991 |
| NIST Mac Validation System (MVS) Successful Validations |
NIST; 03/93 |
| Sample Statements of Work for Federal Computer Security Services: For Use In-House or Contracting Out |
NIST 06/92 |
| Secure Data Network System Transport Protocol |
NISTIR 90-4228 |
| Security Functionality Standards |
NIST; 01/92 |
| Security Program Management Draft |
NIST 1991 |
| Threat Assessment of Malicious Code and Human Computer Threats |
NISTIR 4939; 10/92 |
| Document Title | Reference # or Description |