The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

A Network of Firewalls: An Implementation Example

Brian McKenney, Daniel Woycke, Walt Lazear
Added 2002-07-26

NIST Computer Security Program Overview

National Institute of Standards and Technology
Added 2002-07-26

Kerberos: An Authentication Service for Computer Network

B. Clifford Neuman, Theodore Ts'o
Added 2002-07-26

Management Guide to Software Reuse

William Wong

This document, the second in a series on software reuse, focuses on the improvement of productivity and quality of software as well as the reduction of software risks.  Software reusability can provide substantial economic benefits.  Initial reusability efforts should emphasize an understanding of the concept of software reuse, and encourage the use of existing well-developed software specifications, designs, methods, techniques, tools, and other reusable information.  This report presents general management guidance in software reuse.  While there is no magic solution to the problem pf achieving the goals of software reuse, economic reasons of software reuse, and identifies those techniques and characteristics which will assist management in improving software reuse.

Added 2002-07-26

A Head Start on Assurance

Marshall D. Abrams, Patricia R. Toth, ed., U.S. Department of Commerce

The purpose of the Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness was to identify crucial issues on assurance in IT systems and to provide input into development of policy guidance on determining the type and level of assurance appropriate in a given environment.  The readers of these proceedings include those who handle sensitive information involving national security, privacy, commercial value, integrity, and availability. Existing IT security policy guidance is based on computer and communications architectures of the early 1980s.  Technological changes since that time mandate a review and revision of policy guidance on assurance and trustworthiness, especially since the changes encompass such technologies as distributed systems, local area networks, the worldwide Internet, policy-enforcing applications, and public key cryptography.

Added 2002-07-26

Thinking about Firewalls

Marcus J. Ranum
Added 2002-07-26

Implementing Exceptions in C

Eric S. Roberts
Added 2002-07-26

Expert Systems in Intrusion Detection: A Case Study

Michael M. Sebring, Eric Shellhouse, Mary E. Hanna
Added 2002-07-26

Are Computer Hacker Break-ins Ethical?

Eugene H. Spafford
Download: PDF
Added 2002-07-26

The Internet Worm Program: An Analysis

CSD TR 823
Eugene H. Spafford
Download: PDF
Added 2002-07-26

OPUS: Preventing Weak Password Choices

Eugene H. Spafford
Download: PDF
Added 2002-07-26

The Internet Worm Incident

CSD TR - 933
Eugene H. Spafford
Download: PDF
Added 2002-07-26

A Report on the Accuracy of Some Floating Point Math Functions on Selected Computers

Eugene H. Spafford, John C. Flaspohle
Added 2002-07-26

What is a Computer Virus?

Eugene H. Spafford, Kathleen A. Heaphy, David J. Ferbrache
Added 2002-07-26

User Authentication and Related Topics: An Annotated Bibliography

Eugene H. Spafford, Stephen A. Weeber
Added 2002-07-26