An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part II.
8f9d12fbac044a4b0584a70fe6eec9b12b887550eaa846b5bc3105678569fece
Access Control and Policy Enforcement in Internetworks. Methods of controlling access policy between different administrative domains of an internetwork. Part II
ee7be268f4f9fe5bdbd62723c89ca6764077f019982dd3ea18a0432e932ac78a
An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part III.
a693a97c84ae33514641f6589f5820ae731534dff52b790b42fd3a57d3b3d432
Access Control and Policy Enforcement in Internetworks. Methods of controlling access policy between different administrative domains of an internetwork. Part III
d76c592eb6b8041f87421a7ff0d041f4e04aac9e04d336f1cff67a5166f810cc
An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part IV.
3a8563c610644c428e9b1507676464c926333f833921f2088708a729cf7465a2
An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part V.
d651d04513876c80456468d6f1c330192b82fa630622672449472fffe2371ca1
User Authentication and Related Topics: An Annotated Bibliography
08245ddd0136802271b1e792765b6280b2980b7cae625f9140b0d398766bc550
UNIX Password Security: A discussion of the importance of well-chosen passwords, and how passwords are cracked
c8678acf4db6fbbcf4059305c7eb88ac5074fcae1a7fcb777e91c3266724a7a5
Proxy-Based Authorization and Accounting for Distributed Systems: A method to support both authorization and accounting in a distributed environment
34a402fb72c945d9e211d6d2abe62b467e7e89e1110942fb7271bcde44e84424
Privacy-Enhanced Electronic Mail: A description of the Internet Privacy-Enhanced Mail protocols
0cb7b079482a66d030b54cc26a7da43f5840afc26f73ceb62a56985563562da8
RSA Encryption Standard.
dbe506cec41f593395b029d9939fdc4ca786b68cb1ec63edf7c694c856b98c79
Certifcation Request Syntax Standard
a9a839714e1e5e55b01bd54fffc8c1fd61ab3af9482f0bbeacd321a69940b462
Diffie-Hellman Key-Agreement Standard.
5ce50cbd5ee511da5ea9062ba2d5aceec3ae57629c3db8b13268e8998d8a707d
Password-Based Encryption Standard.
b0edd00c16073e598ef69746bf3fea134a306f6ca1248268bebda68ef76af2e3
Extended-Certificate Syntax Standard
f07580a404b09591e31abb63f4336db5a256a916590aa109c00bb0c5a4fc3031
Cryptographic Message Syntax Standard
6b81154cec3cdeced2eaec7c13f9e59f18a96f8b575988b430da0a159e2ea2f1
Private-Key Information Syntax Standard
1d01be37b08823beb0ea019ee147a56090736098b92916e76058c74470e4e67c
Selected Attribute Types
c1bb3bc9fe6d6784c96c49a622f48d83e9c927edee767c518e951bb01b519b1c
Pseudo-Network Drivers and Virtual Networks: A method for creating pseudo-networks, much like the pseudo-terminals in use on many UNIX systems.
1b54c147a27a7d981758cc12dcf1dcc3b3c71d45b74d00a107bf72ec4f341bc1
Complete text of the Privacy Act of 1974 and Amendments, 5 USC 552a
b26f4a1db6e51f9b2ade6d6902621036c8b9e8310852b5febcf6bd667492faf4
Network Security via Private-Key Certificates: Some practical security protocols that use private-key encryption in the public-key style
3f459829ae5cc19ba32e6deaf65e3a866b37601e1a6c4b3d838bf6d799996e4e
Protection and Security Issues for Future Systems: An examination of the problems of protection and security as applied to future computer systems.
5d6fe182ed9630d4b08244ee3c447b81ee3f428b1b77d2410486bd92dcce2886
Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one
ca6cfc5f377dcf373bb18130b53ef90f3f7c98de4ae14a86a88535f94b44da03
UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware
93aafb58b4907d97438db4c8dfea03f1de784857ae6b9580f04bf9c47c4c552f
On the Security of UNIX: The original UNIX security paper
9bac6dc5097a779ea1b31d7a8d59616f5a483035a7656d85804d9499b9756499