The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Next Generation Intrusion Detection Expert System (NIDES)

Debra Anderson,Thane Frivold,Alfonso Valdes
Added 2002-07-26

A Generic Virus Scanner in C++

Sandeep Kumar, Eugene H. Spafford
Download: PDF
Added 2002-07-26



Teaching Engineering Ethics: A Case Study Approach

Pritchard, Michael S.
Added 2002-07-26

Computer System Dependability: An Introduction

Andrew M. Lord
Added 2002-07-26

Knowledge-Based Intrusion Detection

Teresa F. Lunt, R. Jagannathan, Rosanna Lee, Alan Whitehurst, Sherry Lisgarten
Added 2002-07-26

Learning How to Characterize Normal Behavior in Local Area Networks

Arthur B. Maccabe, Ruth McDonald, Vinay Anand
Added 2002-07-26

A Network of Firewalls: An Implementation Example

Brian McKenney, Daniel Woycke, Walt Lazear
Added 2002-07-26

NIST Computer Security Program Overview

National Institute of Standards and Technology
Added 2002-07-26

Kerberos: An Authentication Service for Computer Network

B. Clifford Neuman, Theodore Ts'o
Added 2002-07-26

Management Guide to Software Reuse

William Wong

This document, the second in a series on software reuse, focuses on the improvement of productivity and quality of software as well as the reduction of software risks.  Software reusability can provide substantial economic benefits.  Initial reusability efforts should emphasize an understanding of the concept of software reuse, and encourage the use of existing well-developed software specifications, designs, methods, techniques, tools, and other reusable information.  This report presents general management guidance in software reuse.  While there is no magic solution to the problem pf achieving the goals of software reuse, economic reasons of software reuse, and identifies those techniques and characteristics which will assist management in improving software reuse.

Added 2002-07-26

A Head Start on Assurance

Marshall D. Abrams, Patricia R. Toth, ed., U.S. Department of Commerce

The purpose of the Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness was to identify crucial issues on assurance in IT systems and to provide input into development of policy guidance on determining the type and level of assurance appropriate in a given environment.  The readers of these proceedings include those who handle sensitive information involving national security, privacy, commercial value, integrity, and availability. Existing IT security policy guidance is based on computer and communications architectures of the early 1980s.  Technological changes since that time mandate a review and revision of policy guidance on assurance and trustworthiness, especially since the changes encompass such technologies as distributed systems, local area networks, the worldwide Internet, policy-enforcing applications, and public key cryptography.

Added 2002-07-26

Thinking about Firewalls

Marcus J. Ranum
Added 2002-07-26

Implementing Exceptions in C

Eric S. Roberts
Added 2002-07-26