The Center for Education and Research in Information Assurance and Security (CERIAS)
The Center for Education and Research in
Information Assurance and Security (CERIAS)
Menu
Search CERIAS
Go
HOME
(current)
ABOUT
About CERIAS
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
PEOPLE
Faculty & Research Staff
Student List
Staff
PhD Graduates
Awards
All People
PARTNERS
Strategic Partners
External Advisory Board
Donors
Purdue Campus Partners
All Partners
SEMINARS
NEWS & BLOGS
RESEARCH
EDUCATION
RESOURCES
STUDENTS
SYMPOSIUM
Search CERIAS
Go
Home
>
Reports and Papers Archive
>
Reports and Papers Archive
Search:
Type:
Type
article
book
booklet
collection
conference
inbook
incollection
inproceedings
manual
mastersthesis
misc
patent
phdthesis
proceedings
techreport
unpublished
Browse All Papers »
Submit A Paper »
‹ First
<
3
4
5
>
Last ›
A Guide to Understanding Configuration Management in Trusted Sytems
National Computer Security Association
Added 2017-01-19
Trusted UNIX Working Group (Trusix) Rationale for Selecting Access Control List Features for the UNIX System
National Computer Security Association
Added 2017-01-19
Rating Maintenance Phase Program Document
National Computer Security Association
Added 2017-01-19
Guidelines for Formal Verification Systems
National Computer Security Association
Added 2017-01-19
A Guide to Understanding Design Documentation in Trusted Systems
National Computer Security Association
Added 2017-01-19
A Guide to Understanding Trusted Distribution in Trusted Systems
National Computer Security Association
Added 2017-01-19
Trusted Network Interpretation
National Computer Security Association
Added 2017-01-19
Rating Maintenance Phase Program Document
National Computer Security Association
Added 2017-01-10
Turning Multiple Evaluated Products into Trusted Systems
National Computer Security Association
Added 2017-01-10
Introduction to Certification and Accreditation
National Computer Security Association
Added 2017-01-10
A Guide to Procurement of Single and Connected Systems Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators Includes Complex, Evolving, Multipolicy Systems
National Computer Security Association
Added 2017-01-10
A Guide to Understanding Identification and Authentication in Trusted Systems
National Computer Security Association
Added 2017-01-10
Assessing Controlled Access Protection
National Computer Security Association
Added 2017-01-10
Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Department of Defense
Added 2017-01-10
Trusted Product Evaluation Questionnaire
National Computer Security Association
Added 2017-01-10
‹ First
<
3
4
5
>
Last ›