The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

A Logical Language for Expressing Authorizations

Sushil Jajodia,Pierangela Samarati,V. S. Subrahmanian
Added 2002-07-26


Intermatic Incorporated vs. Dennis Toeppen

US District Court N.D. Illinois
Added 2002-07-26

ASN_EZE: An Analgesic for Writers of ASN.1 Applications

Charles W. Gardiner

Many programmers find that logical data defined in ASN.1 is simple enough, but the physical representation requires painfully careful attention to lots of detail. ASN.1 ‘compilers’ which we had used required a programmer to know the intricacies of both ANS.1 and generated code

Added 2002-07-26


Security Workshop

Los Alamos National Laboratory
Added 2002-07-26

Network/Internet Security Overview

Dr. Albert B. Jeng
Added 2002-07-26

The Application of Neural Networks To UNIX Computer Security

Kymie Tan

Computer Security can be divided into two distinct areas, preventative security and the detection of security violations.

Added 2002-07-26

1995 IEEE Symposium on Security and Privacy

IEEE Computer Society on Security and Privacy,The International Association for Cryptologic Research (IACR)
Added 2002-07-26


Information Technology Laboratory

US Department of Commerce
Added 2002-07-26

Information Technology Laboratory Technical Accomplishments 1997

US Department of Commerce
Added 2002-07-26

Guide to NIST National Institute of Standards and Technology

US Department of Commerce
Added 2002-07-26

Security in ISDN

US Department of Commerce,William E. Burr
Added 2002-07-26

Guide for Selecting Automated Risk Analysis Tools

US Department of Commerce
Added 2002-07-26