Kim Schaffer
YOU?
Author Swipe
View article: Recommendations for federal vulnerability disclosure guidelines
Recommendations for federal vulnerability disclosure guidelines Open
Receiving reports on suspected security vulnerabilities in information systems is one of the best ways for developers and services to become aware of issues. Formalizing actions to accept, assess, and manage vulnerability disclosure report…
View article: CMVP approved security functions :
CMVP approved security functions : Open
The approved security functions listed in this publication replace the ones listed in ISO/IEC 19790 Annex C and ISO/IEC 24759 6.15, within the context of the Cryptographic Module Validation Program (CMVP). As a validation authority, the CM…
View article: CMVP approved sensitive security parameter generation and establishment methods :
CMVP approved sensitive security parameter generation and establishment methods : Open
The approved sensitive security parameter generation and establishment methods listed in this publication replace the ones listed in ISO/IEC 19790 Annex D and ISO/IEC 24759 paragraph 6.16, within the context of the Cryptographic Module Val…
View article: CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759
CMVP Approved Non-Invasive Attack Mitigation Test Metrics: CMVP Validation Authority Updates to ISO/IEC 24759 Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation'
View article: CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759
CMVP Approved Sensitive Security Parameter Generation and Establishment Methods: CMVP Validation Authority Updates to ISO/IEC 24759 Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759
CMVP Approved Security Functions: CMVP Validation Authority Updates to ISO/IEC 24759 Open
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation'
View article: (Draft) Recommendations for Federal Vulnerability Disclosure Guidelines
(Draft) Recommendations for Federal Vulnerability Disclosure Guidelines Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: Ontology for Authentication
Ontology for Authentication Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: CMVP approved security functions:
CMVP approved security functions: Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's
View article: CMVP approved sensitive parameter generation and establishment methods:
CMVP approved sensitive parameter generation and establishment methods: Open
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
View article: CMVP security policy requirements:
CMVP security policy requirements: Open
44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall n…
View article: CMVP approved authentication mechanisms:
CMVP approved authentication mechanisms: Open
3551 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to …
View article: FIPS 140-3 derived test requirements (DTR):
FIPS 140-3 derived test requirements (DTR): Open
113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems
View article: CMVP documentation requirements:
CMVP documentation requirements: Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: CMVP approved non-invasive attack mitigation test metrics:
CMVP approved non-invasive attack mitigation test metrics: Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: Educating Next-Gen Computer Scientists
Educating Next-Gen Computer Scientists Open
Just as yeast, flour, water, and salt are to bread, algorithms, data structures, operating systems, database design, compiler design, and programming languages were computer science (CS) education's core ingredients in past years. Then, un…
View article: Computer Science Education in 2018
Computer Science Education in 2018 Open
Six senior computer science educators answer questions about the current state of computer science education, software engineering, and licensing software engineers.
View article: What Happened to Formal Methods for Security?
What Happened to Formal Methods for Security? Open
We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare "How did Software Get So Reliab…