Sample records for STAATSSICHERHEIT (national security)
from WorldWideScience.org

Sample records 1 - 20 shown. Select sample records:



1

Workshop Report on the Role of Optical Systems and Devices for Security

Mayfield, T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

2

Viewpoint

Ware, W.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

3

Vendors Experience with Security Evaluations

DeMello, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

4

Using Security to Meet Business Needs: An Integrated View From The United Kingdom

McIntosh, A.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

5

User-centered Security and Adage

Zurko, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

6

Use of the Zachman Architecture for Security Engineering

Henning, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

8

U.S. Government Wide Incident Response Capability

Swanson, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

9

Trusted Process Classes

Steffan, W. L.; Clow, J. D.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

10

The Trusted Product Evaluation Program: Direction for the Future

Pedersen, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

11

The Taiwan Dilemma: China, Japan, and the Strait Dynamic

Jason J. Blazevic; Idaho State University

Many Chinese and Japanese authorities believe Taiwan is essential to their respective states’ national security due to the island’s geographic centrality and beneficial proximity to nearby and distant sea lanes. Of further importance is Taiwan’s immediacy to territorial and resource disputes between...

DRIVER (German)

13

The Path Dependence of European Copyright

Larsson, Stefan

This article analyses the path dependence of European copyright. It shows how copyright is legally constructed, is harmonised through international treaties and European regulatory efforts in terms of InfoSoc Directive and the IPRED, and is also affected by the Data Retention Directive and the Telec...

DRIVER (German)

14

The Next Generation of Cybercriminals

Gembicki, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

15

The Keys to a Reliable Escrow Agreement

Sheffield, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

17

The Certification of the Interim Key Escrow System

Snouffer, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

18

The Certification and Accreditation Process Handbook For Certifiers

Wisniewski, P.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

19

The Advanced Intelligent Network - A Security Opportunity

Casey, T. A.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

20

Task-based Authorization: A Research Project in Next-generation Active Security Models

Thomas, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

22

Surmounting the Effects of Lossy Compression on Steganography

Currie, D. L.; Irvine, C. E.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

23

Standards in Certification and Accreditation

Stark, C.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

24

Social Security for China’s Migrant Workers – Providing for Old Age

Andrew Watson; University of Adelaide

The concept of “migrant workers” derives from the household registration system of China’s planned economy period. The continued existence of that system conflicts with the development of an integrated labour market. The current social security system, based on household registration and a large num...

DRIVER (German)

25

Security in World Wide Web Browsers: More than Visa cards?

Dobry, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

27

Security for All-Optical Networks

Ingles, J.; McNown, S.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

28

Security Through Process Management

Bayuk, J. L.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

29

Security Protocols/Protocol Security

Maughan, D.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

30

Security Proof of Concept Keystone (SPOCK)

McGehee, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

31

Security Policies for the Federal Public Key Infrastructure

Nazario, N. A.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

32

Security Issues in Emerging High Speed Networks

Varadharajan, V.; Katsavos, P.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

33

Security Issues for Telecommuting

Carnahan, L. J.; Guttman, B.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

34

Security Issues For All-Optical Networks

Medard, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

37

Security APIs: CAPIs and Beyond

Reiss, A.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

38

Secure Networking and Assurance Technologies

Lunt, T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

39

Secure Mobile Networks

McHugh, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

42

Reactive Security and Social Control

Janson, S.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

44

Privacy Rights in a Digital Age

Galkin, W.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

45

Poverty and Food Security Monotoring in Cambodia Linking Programmes and Poor People's Interests to Policies

Weingärtner, Lioba; Fiebiger, Markus; Höltge, Kristin; Schulmeister, Anke; Strele, Martin; Were, Jaqueline

DRIVER (German)

46

Position Statement for New Paradigms Internetwork Security Panel

Greenwald, S.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

47

Optical Processing Systems for Encryption, Security Verification, and Anticounterfeiting

Javidi, B.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

48

New Paradigms for Internetwork Security

Haigh, J. T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

49

NISS Whitepaper: A New Model of Security for Distributed Systems

Wulf, W.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

50

Marketing & Implementing Computer Security

Wilson, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

51

Managing Urban Disaster Risk: Analysis and Adaptation Frameworks for Integrated Settlement Development Programming for the Urban Poor

Wamsler, Christine

The damage caused by the dramatic worldwide increase in ‘natural’ disasters is staggering, with the poor in developing countries being most at risk. Disasters make their already precarious living conditions worse, creating a vicious circle of poverty from which they find it hard to escape. To achiev...

DRIVER (German)

53

Malicious Data and Computer Security

Sibert, W. O.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

54

MLS DBMS Interoperability Study

Burns, R. K.; Koh, Y.-F.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

56

MISSI Compliance for Commercial-Off-The-Shelf Firewalls

Hale, M.; Mannarino, T.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

60

Legal Aspects of Ice-Pick Testing

Gabrielson, B. C.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

62

Key Escrowing Systems and Limited One Way Functions

Jennings, W. T.; Dunham, J. G.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

63

Internet Firewalls Policy Development and Technology Choices

D Alotto, L. J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

64

Interdisciplinary Perspectives on Information Security: Mandatory Reporting

Kabay, M. E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

65

Intellectual Property Rights and Computer Software

Bowman, D. E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

67

Information Systems Auditing Requirements

Lainhart, J. W.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

68

Information Security Challenges in the Financial Services Industry

Cook, C. T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

69

Industrial Espionage Today and Information Wars of Tomorrow

Joyal, P. M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

70

IGOR: The Intelligence Guard for ONI Replication

Shore, R. W.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

72

Generic Software Wrappers for Security and Reliability

Badger, L.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

73

Generic Model Interpretations: POSIX.1 and SQL

Bell, D. E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

74

Future of Trust in Commercial Operating Systems

Inskeep, T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

75

Firewall Testing and Rating

Wack, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

76

Facing the Challenge: Secure Network Technology for the 21^s^t Century

Schaeffer, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

78

Ethical and Responsible Behavior for Children to Senior Citizens in the Information Age

Warshawsky, G. S.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

79

Esquemas de firma digital con verificación distribuida

Herranz, Javier; Ruiz, A.; Sáez, Germán

8 pages.-- Contributed to: X Spanish Meeting on Cryptology and Information Security (Salamanca, Spain, Sep 2-5, 2008). | En algunas ocasiones, una persona que ha firmado digitalmente un documento puede preferir que no todo el mundo tenga la capacidad para verificar la validez de la firma. Hay varios...

DRIVER (German)

80

Electronic Data: Privacy, Security, Confidentiality Issues

Blair, K. R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

81

Electronic Data: Privacy, Security and Confidentality

Palenski, R. J.; Mandell, S. A.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

82

Developmental Assurance and the Common Criteria

Schanken, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

83

Developing Secure Objects

Frincke, D.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

85

Design and Management of a Secure Networked Administration System: A Practical Solution

Varadharajan, V.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

86

Deriving Security Requirements for Applications on Trusted Systems

Spencer, R.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

87
88

Data Warehousing, Data Mining, and the Security Issues

Campbell, J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

89

Data Warehousing, Data Mining, and Security: Developments and Challenges

Thuraisingham, B.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

90

Current Challenges in Computer Security Program Management

Wilson, M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

92

Computer Virus Response Using Autonomous Agent Technology

Trently, C. M.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

93

Common Criteria Project Implementation Status

Troy, E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

94

Commentary on “A Modest Proposal for a Basic Agreement on Peaceful Cross-Strait Development” by Chang Ya-chung

Jean-Pierre Cabestan; Hong Kong Baptist University

The main question that Chang Ya-chung’s Modest Proposal triggers is whether a political and security agreement can realistically be reached today. The twelve agreements signed by Beijing and Taibei since 2008 should be saluted as conducive to constructing détente, nonmilitary confidence-building mea...

DRIVER (German)

95

Chinese Perceptions of Russian Foreign Policy During the Putin Administration: U.S.-Russia Relations and “Strategic Triangle” Considerations Chinas Sichtweise der russischen Außenplitik während der Regierungszeit von Putin: Die Beziehung zwischen den USA und Russland sowie Überlegungen eines "strategischen Dreiecks"

Joseph Yu-shek Cheng; City University of Hong Kong

This article examines the Chinese perception of Russian foreign policy during the Putin administration by analysing Beijing’s assessment of Russia’s foreign policy objectives and its policy towards the U.S., as reflected in the official media and the authoritative publications of China’s major secur...

DRIVER (German)

96

China’s Foreign- and Security-policy Decision-making Processes under Hu Jintao

Jean-Pierre Cabestan; Hong Kong Baptist University

Since 1979, foreign- and security-policy-making and implementation processes have gradually and substantially changed. New modes of operation that have consolidated under Hu Jintao, actually took shape under Jiang Zemin in the 1990s, and some, under Deng Xiaoping. While the military’s role has dimin...

DRIVER (German)

97

China’s Employment Crisis – A Stimulus for Policy Change? Chinas Beschäftigungskrise - Antrieb für einen Politikwechsel?

Günter Schucher; GIGA German Institute of Global and Area Studies

In the face of severe job problems, China’s government has adopted a huge stimulus package in a bid to achieve eight per cent economic growth, which is said to guarantee at least enough jobs for the new entrants to the labour market. The real situation, however, will be much grimmer than statistics ...

DRIVER (German)

98

China’s Climate- and Energy-security Dilemma: Shaping a New Path of Economic Growth

Karl Hallding; Stockholm Environment Institute; Guoyi Han; Stockholm Environment Institute; Marie Olsson; Stockholm Environment Institute

China is undergoing modernization at a scale and speed the world has never witnessed. As climate change increasingly dominates the global agenda, China faces the challenge of shaping a new growth path in a climate-constrained world. The paper argues that China’s current climate and energy policy is,...

DRIVER (German)

99

Case Study of Industrial Espionage Through Social Engineering

Winkler, I. S.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

100

Best of the New Security Paradigms Workshop

Haigh, T.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

101
102

Attack Class: Address Spoofing

Heberlein, L. T.; Bishop, M.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

103

Are Cryptosystems Really Unbreakable?

Denning, D. E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

105

Applying the Eight Stage Risk Assessment Methodology to Firewalls

Drake, D. L.; Morse, K. L.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

106

An Isolated Network for Research

Bishop, M.; Heberlein, L. T.; National Institute of Standards and Technology
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

107

An International Standard for the Labeling of Digital Products

Hampel, V. E.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

108

Adaptable Dependable Wrappers

Weber, D.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

109

A Security Flaw in the X.509 Standard

Chokhani, S.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

111

A Case for Avoiding Security-Enhanced HTTP Tools to Improve Security for Web-Based Applications

Wood, B. J.; National Institute of Standards and Technology; National Computer Security Center
1996-01-01

German National Library of Science and Technology (GetInfo) (German)

112