Back to Results
First PageMeta Content
Crime prevention / National security / Computer network security / Key management / ISO standards / FIPS 140-2 / Key size / Information security / Password / Security / Computer security / Cryptography


NETWORK SECURITY FRAMEWORK: ROBUSTNESS STRATEGY Teri Arber, NSA Deb Cooley, NSA Steve Hirsch, NSA Martha Mahan, NSA
Add to Reading List

Document Date: 1999-11-05 00:00:00


Open Document

File Size: 2,73 MB

Share Result on Facebook

Company

EMC / ISSEs / /

Event

FDA Phase / Person Communication and Meetings / /

Facility

National Institute of Standards and Technology / FIPS PUB / /

IndustryTerm

prescriptive solution / storage media / information security device / secure systems / hybrid solutions / Internet cash / overall network solution / physical devices / security critical hardware / Internet voting / security solution / telecommunications / cryptographic algorithms / security services / network security technology / proposed security services / individual security services / related supporting security services / real time nature / particular product / system/network / cryptographic algorithm / individual solutions / convential security services / particular solution / technology evolution / acceptable solutions / security solutions / /

OperatingSystem

Unix / /

Organization

National Institute of Standards and Technology / NSF System Security Methodology Chapter / Federal Communications Commission / Security Management Infrastructure Chapter / National Science Foundation / Trusted Third Party / Security Management Mechanisms Compromise System Recovery Administration / Department of Defense / Poor System Administration / /

Person

Martha Mahan / Jim Osterritter / Steve Hirsch / Teri Arber / Deb Cooley / /

/

Position

Information Systems Security Engineer / General / /

Product

SML3 / NSF98 / /

Technology

cryptography / 3 Integrity Mechanisms Cryptographic Algorithm / public key / artificial intelligence / underlying cryptographic algorithm / network security technology / Unix / Information Technology / SML1 algorithm / SML3 algorithm / Peer to Peer / SML2 algorithm / w/SML1 cryptographic algorithm / digital signature / 2 Confidentiality Mechanisms Cryptographic Algorithm / cryptographic algorithm / cryptographic spread spectrum signal techniques TBD If Cryptographic Algorithm / w/SML2 cryptographic algorithm / /

URL

http /

SocialTag