Advanced search Help
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
1993 Midwest Flood Disaster Assistance Operation
This document identifies key observations made from flood response effort in the Midwest. "A flood has been described as a 'disaster in slow-motion'. This was certainly the case in the Midwestern United States starting in February 1993. Campaigns were fought over 2000 miles of rivers in Kansas, Nebraska, South Dakota, North Dakota, Iowa, Missouri, Minnesota, and Illinois."
United States. Department of the Army
1994-10
-
Coordinate Control of Interior and Exterior Autonomous Platforms
"The Mobile Detection Assessment Response System (MDARS) Program is a joint Army-Navy effort to field interior and exterior autonomous platforms performing security and inventory assessment functions at DoD warehouses and storage sites. The program is managed by the Physical Security Equipment Management Office at Ft. Belvoir, VA. The MDARS Interior Program successfully demonstrated the simultaneous control of two robots and four simulated robots operating in an interior warehouse environment. The command and control architecture is structured to accommodate up to thirty-two robots. Initiated in February 1993, the MDARS Exterior Program will provide commanders with an automated system to conduct random site patrols, barrier assessment, intruder detection and assessment, and inventory assessment in a semi-structured outdoor environment. This paper briefly outlines the MDARS Interior and Exterior Programs and discusses the technical risks associated with the Exterior development approach."
Naval Command, Control, and Ocean Surveillance Center (U.S.)
Everett, H. R., 1949-; Heath-Pastore, T.A.
1994-10
-
Mitigation of Flood and Erosion Damage to Residential Buildings in Coastal Areas
"The purpose of this investigation was to document the broad range of nonstructural mitigation activities undertaken nationwide in communities exposed to coastal flooding and erosion. This survey provides necessary documentation on which to base a federal, state, or community coastal flood and erosion hazard mitigation program. FEMA's investigation revealed that many homeowners in coastal areas have floodproofed over the last several decades and, based on current construction activity, this trend continues. The primary floodproofing measures being used are elevation of homes in place and relocation of homes to safer locations. Design and construction methods for elevation and relocation of homes are well documented and have remained standard throughout the years because they have generally proven to be technically feasible and financially viable. Less frequently used floodproofing alternatives to elevation and relocation of threatened homes include demolition of the structure, or taking no action to floodproof, when it is hoped that future damages will be minimal or where floodproofing would not be financially desirable."
United States. Federal Emergency Management Agency
1994-10
-
Energy and Technology Review (October 1994)
This journal features articles on the Industrial Computing Initiative, Artificial Hip Joints (Applying Weapons Expertise to Medical Technology), the KEN Project, Modeling Groundwater Flow, Chemical Migration, and Gas and Oil National Information Infrastructure.
Lawrence Livermore National Laboratory
Bookless, William A.
1994-10
-
Army Field Manual: Chemical and Biological Contamination Avoidance
This manual is one of five that explains the fundamentals of NBC defense: FM 3-3, Chemical and Biological Contamination Avoidance; FM 3-3-1, Nuclear Contamination Avoidance; FM 3-4, NBC Protection; FM 3-5, NBC Decontamination; FM 3-7, NBC Handbook. A general overview of these fundamentals is given in FM 3-100, NBC Operations. This manual, FM 3-3, defines and clarifies the entire process of CB contamination avoidance.
Another manual, FM 3-3-1, outlines contamination avoidance procedures for nuclear operations. FM 3-3 details the NBC Warning and Reporting System, how to locate and identify CB
contamination, and how to operate in and around NBC contamination. This manual is designed and intended to be an easy-to-read, step-by-step manual depicting the manual method of calculating CB contamination avoidance procedures for chemical officers and NCOs. However, subject matter discussed in Chapters 1 and 2 and Appendices A and C are of general use for all branches and MOS.
United States. Department of Defense
1994-09-29
-
Training Circular 3-10: Commander's Tactical NBC Handbook
Training Circular 3-10 provides commanders of battalion and brigade-sized units with the tactics, techniques and procedures (TTP) to train and operate under nuclear, biological, and chemical (NBC) conditions. Ultimately, the focus of this manual is to take the mystery and fear out of NBC defense. Leaders and soldiers must develop confidence in their equipment and in their own ability to both survive and operate effectively while wearing MOPP gear.
United States. Department of Defense
1994-09-29
-
Leaders' Manual for Combat Stress Control
"This field manual (FM) provides information for all leaders and staff on the control of combat stressors and the prevention of stress casualties. It identifies the leaders' responsibilities for controlling stress and recognizing the effects of stress on their personnel. It reviews Army operational doctrine for war and operations other than war. It identifies likely stressors and recommends actions for leaders to implement for the prevention and management of stress. The manual describes the positive and negative combat stress behavior associated with stress and provides leader actions to minimize battle fatigue risk factors. It provides the many different military branches and disciplines with a common conceptual framework, knowledge base, and vocabulary so they work together toward controlling stress. It provides information on how stressors and the stress process interact to improve or disrupt military performance. It identifies the supporting role of special staffs such as the chaplain and the Judge Advocate General. This manual also identifies the responsibilities of medical personnel for prevention, treatment, and management
of battle fatigue and stress-related casualties."
United States. Department of the Army
1994-09-29
-
Field Manual 3-7: NBC Field Handbook
This manual, FM 3-7, is designed as a guide to help the chemical soldier at battalion level and below in NBC defense. It details the NBC warning and reporting system, and how to locate, identify, and operate in and around NBC contamination. This manual is designed to be an easy-to-read, step-by-step manual depicting the manual method of calculating NBC defense procedures useful for the field soldier. A more detailed discussion of NBC defensive measures may be found in: FM 3-3, Chemical and Biological Contamination Avoidance; FM 3-3-1, Nuclear Contamination Avoidance; FM 3-4, NBC Protection; FM 3-4-1, Fixed Site Protection; FM 3-5, NBC Decontamination; FM 3-11, Flame Field Expedients. Chemical soldiers must be familiar with and be able to apply the information in this manual.
United States. Department of Defense
1994-09-29
-
Executive Order 12930: Measures to Restrict the Participation by the United States Persons in Weapons Proliferation Activities
This executive order declares a national emergency to deal with the threat of the proliferation of nuclear, biological, and chemical weapons. "The Secretary of Commerce, in consultation with the Secretary of State, is hereby authorized and directed to take such actions, including the promulgation of rules, regulations, and amendments thereto, as may be necessary to continue to regulate the activities of United States persons in order to prevent their participation in activities that could contribute to the proliferation of weapons of mass destruction and the means of their delivery, as provided in the Export Administration Regulations, set forth at 15 CFR Parts 768-799 (1994)."
United States. Office of the Federal Register
Clinton, Bill, 1946-
1994-09-29
-
Leader's Manual for Combat Stress Control
This field manual (FM) provides information for all leaders and staff on the control of combat stressors and the prevention of stress casualties. It identifies the leaders' responsibilities for controlling stress and recognizing the effects of stress on their personnel. It reviews Army operational doctrine for war and operations other than war. It identifies likely stressors and recommends actions for leaders to implement for the prevention and management of stress. The manual describes the positive and negative combat stress behavior associated with stress and provides leader actions to minimize battle fatigue risk factors. It provides the many different military branches and disciplines with a common conceptual framework, knowledge base, and vocabulary so they work together toward controlling stress. It provides information on how stressors and the stress process interact to improve or disrupt military performance. It identifies the supporting role of special staffs such as the chaplain and the Judge Advocate General. This manual also identifies the responsibilities of medical personnel for prevention, treatment, and management of battle fatigue and stress-related casualties.
United States. Department of the Army
1994-09-29
-
Guideline for the Use of Advanced Authentication Technology Alternatives
This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods. Although the traditional approach to authentication relies primarily on passwords, it is clear that password-only authentication often fails to provide an adequate level of protection. Stronger authentication techniques become increasingly more important as information processing evolves toward an open systems environment. Modern technology has produced authentication tokens and biometric devices which are reliable, practical, and cost-effective. Passwords, tokens, and biometrics can be used in various combinations to provide far greater assurance in the authentication process than can be attained with passwords alone.
National Institute of Standards and Technology (U.S.)
1994-09-28
-
Letter to the Honorable Tim Valentine and the Honorable Tom Lewis, Committee on Science, Space, and Technology, from Allen Li, RAND Associate Director of Transportation Issues, discussing Aviation Security, September 27, 1994
Pursuant to a legislative requirement, GAO reviewed Federal Aviation Administration's (FAA) efforts to comply with the Aviation Security Improvement Act and develop and implement new security technologies. GAO noted that: (1) FAA did not meet Congress' goal to deploy new security technology at airports by November 1993; (2) although several explosive detection devices could improve airport security, technical problems have slowed their development; (3) considerable time will be needed to implement the new technologies at high-threat domestic and international airports; (4) although improving aircraft survivability through blast resistant luggage containers and hardened structures shows promise, it is uncertain when these technologies will be in widespread use; (5) FAA needs to improve its certification process for new explosive detection devices because its current process does not adequately test the new systems to ensure their performance and reliability; (6) FAA does not believe that on-site testing should be part of the certification process, since such testing will likely add time and costs to the process; (7) airport testing may enable FAA to gain the confidence of the airline industry; (8) FAA believes that the airline industry should evaluate the software used in new explosive detection devices, since these systems rely heavily on software to indicate the presence of explosive devices; and (9) the costs to acquire new security technology could range from $250,000 to over $1 million per device.
United States. General Accounting Office
1994-09-27
-
Proliferation and the Former Soviet Union
This report, the fifth publication from OTA's assessment on the proliferation of weapons of mass destruction, examines the whole range of consequences for proliferation of the Soviet Union's breakup. One effect may be the erosion of international nonproliferation treaty regimes. In spite of the continuing desire of most of the newly independent states of the former Soviet Union to support nonproliferation goals, these states face severe internal challenges; social and economic disruption are rampant and the degree of central governmental control over activities nominally within their jurisdictions is often questionable. Of particular concern are economic hardship and low morale among many individuals with access to vital weapon information or sensitive facilities, a situation aggravated by as yet inadequate national systems to account for and secure nuclear materials, to control exports, and to police borders. Given the severity of the problems facing Russia and the other newly independent states, the United States and other Western powers may have only marginal ability to influence the overall course of events there. This study describes how U.S. assistance may reduce specific proliferation risks in the former Soviet Union. The consequences of failure to stem these risks provide a strong incentive for the United States to help the newly independent states address them.
United States. Government Printing Office; United States. Congress. Office of Technology Assessment
1994-09-23
-
Chemical Stockpile Emergency Preparedness Program (CSEPP) Pueblo Community Full Scale Exercise 1994: Exercise Report [Pubeblo Depot Activity, CO; August 18, 1994]
"The Pueblo Community Full Scale Exercise 1994 (Pueblo FSX 94) was conducted on August 18, 1994. This exercise was designed and conducted under the auspices of the Chemical Stockpile Emergency Preparedness Program (CSEPP) for the Pueblo Depot Activity (PUDA), the State of Colorado, and Pueblo County. The last CSEPP exercise conducted for the Pueblo Community was a Direction and Control Exercise (DCX) conducted in August 1993. The requirement for conducting CSEPP exercises was established in the August 1988 Memorandum of Understanding between the Army and the Federal Emergency Management Agency (FEMA) (and reaffirmed in a Joint Memorandum for Record on January 19, 1993). Objectives used for the FSX (see Table 1) are contained in the 'Chemical Stockpile Emergency Preparedness Program Exercise Program Document, Part II', dated January 9, 1992. Exercise design, planning, and reporting guidance is contained in the revised 'Chemical Stockpile Emergency Preparedness Program Exercises' document, dated February 23, 1994. The Pueblo Exercise Planning Team was responsible for all aspects of the Pueblo FSX 94 planning. All participating jurisdictions were represented on the team which was co-chaired by representatives from the U.S. Army Defense Ammunition Center and School (USADACS) and FEMA Region VIII. The Co-Chairs from these two organizations also served as the Exercise Co-Directors."
United States. Federal Emergency Management Agency; United States. Department of the Army
1994-09-21
-
Presidential Decision Directive: U.S. Nuclear Posture and Policy on Nuclear Arms Control Beyond the START I and START II Treaties
From the Document: "This Presidential Decision Directive establishes and directs the implementation U.S. nuclear posture and policy on nuclear arms control beyond the START [Strategic Arms Reduction Treaty] I and START II Treaties."
United States. White House Office; National Security Council (U.S.)
1994-09-21
-
Presidential Decision Directive 29: Security Policy Coordination
From the Document: "The Director of Central Intelligence and Secretary of Defense's Joint Security Commission identified four principles which should guide the formulation, evaluation and oversight of our security policy: our security policies and services must realistically match the threats we face and must be sufficiently flexible to facilitate change as the threats evolve; our security policies and practices must be consistent and enable us to allocate scarce resources effectively; our security standards and procedures must result in the fair and equitable treatment of all Americans upon whom we rely to guard our nation's security, and; our security policies, practices and procedures must provide the security we need at a price we can afford."
United States. White House Office
Clinton, Bill, 1946-
1994-09-16
-
Organization Manual
"This manual prescribes the pattern of organization for the Coast Guard and fixes the areas of responsibility which the Commandant has assigned to subordinate components."
United States. Coast Guard
1994-09-15
-
Standard Security Label for Information Transfer
Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated between open systems. Information on a security label can be used to control access, specify protective measures, and determine handling restrictions required by a communications security policy. This standard defines security label syntax for information exchanged over data networks and provides encodings of that syntax for use at the Application and Network Layers. The syntactic constructs defined in this standard are intended to be used along with semantics provided by the authority establishing the security policy for the protection of the information exchanged. A separate NIST document, referenced in an informative appendix, defines a Computer Security Objects Register (CSOR) that serves as a repository for label semantics.
National Institute of Standards and Technology (U.S.)
1994-09-06
-
Abu ' Ata' Al-Sharqi Reports from Afghanistan (English Translation)
This document is a, "description of a letter written by Abu ' Ata' al-Sharqi of the Jihadwal camp in Afghanistan." This author discusses and references, "an attack on a Sunni mosque [as well as] various [other] conflicts surrounding the al-Faroog training camp [between the members of al-Qa'ida and other fighters [in regards to the] al'Furkan project." Abu `Ata' al-Sharqi also share[s] some [of his] thoughts about how the group can become more involved [and] establish a stronger presence in Tajikistan."
Combating Terrorism Center (U.S.)
1994-09-04
-
Risk Communications and the Chemical Stockpile Emergency-Preparedness Program
"The Source Book has been developed for the Chemical Stockpile Emergency Preparedness Program (CSEPP) in support of the training course on risk communications. The purpose of the document is to provide a fairly comprehensive document on risk communication research and recommended practices, especially as they relate to the CSEPP. In a world of increasing risks, appropriate and continual dialogue with affected publics about risks should be one of the foremost concerns of public agencies, especially those involved in risk communications for the CSEPP. How that information is interpreted or modified by existing beliefs remains problematical. To enhance risk communication efforts, we need communications of risks in a language easily understood by the majority of publics. Effective public participation also depends substantially upon the development of indigenous technical and analytic resources and upon the institutional means to act upon and incorporate that increased knowledge."
United States. Federal Emergency Management Agency
Sorensen, John H.; Vogt, Barbara M.
1994-09
-
Layman's Look at Orbital Debris
From the thesis abstract: "Artificial space debris is a new and threatening reality. This thesis examines the requirement of acknowledging this threat as one of the major considerations in the design of Low Earth Orbit (LEO) satellites. The paper commences with a comprehensive view of the issue; the facts of the case are presented. It is necessary to understand the physical fundamentals of this multi-faceted problem in order to view it as a genuine threat to satellites. Following this introduction, an overview of how the problem is currently approached, from a political and technical standpoint, is discussed. Strategies for coping with the space debris issue are then presented. From these, the paper focuses on the most promising prospect for the future. It highlights the need for new and responsible satellite design philosophies in order to deal with the uncertainties of the LEO environment. The research effort concludes that space debris considerations must be incorporated at the earliest phases of a satellite's design efforts, and must be a continuing commitment throughout the operational life of a satellite."
Naval Postgraduate School (U.S.)
Sanchezcastellanos, Armando R.
1994-09
-
IR Missile (Spin-Scan and Con-Scan Seekers) Countermeasures
From the thesis abstract: "In the combat scenario where the infrared missile is an almost continuous threat during the operation, fighter aircraft are currently quite susceptible to being killed in attacks by infrared missiles. Theoretical analysis applied to an encounter simulation seems to indicate that it is possible to use the infrared Active Jammer and the expendable decoy (flare) to defeat the infrared missile (spin-scan and con-scan seekers). The theoretical analysis of a simplified case of a spin-scan and con-scan reticle with amplitude modulation, frequency modulation and phase modulation leads to expressions for the targets' positions, as seen by the missile seeker, under no-jamming condition. The signal waveforms consist of target radiation power failing on the reticle and the reticle modulation function. We apply signal processing techniques to the modulated signal to determine the tracking error rate under no-jamming, active jamming and flare jamming different conditions, and by comparing with the unjammed tracking error rate, to determine the differences and effectiveness of jamming. The analytical result is simulated by means of a simulation program (MATLAB), which evaluates the change in the missile LOS (line of sight ) rotation rate and the impact on the missile guidance operation. The analysis indicated successful jamming in the different jamming source situations. Following the jamming analysis, one can use the result to do further operational analysis as in OT&E (operation test and evaluation) and to evaluate the operational effectiveness of the jammers and to develop operational tactics to further increase the survivability of the fighter aircraft in the combat situation."
Naval Postgraduate School (U.S.)
Chang, Ting Li
1994-09
-
Environment: DOD's New Environmental Security Strategy Faces Barriers, Report to Congressional Requesters
"Pursuant to a congressional request, GAO [General Accounting Office] provided information on the Department of Defense's (DOD) environmental security strategy, focusing on changes made to the DOD organizational structure for environmental management. GAO found that: (1) the revised DOD strategy for protecting the environment focuses on cleanup, compliance, conservation, pollution prevention, and technology; (2) in order to successfully implement its new environmental strategy, DOD will need to improve its cooperation with other agencies, overcome constraints in implementing environmental regulations, and develop better environmental funding methods; (3) in May 1993, DOD created the Office of Environmental Security to focus on specific environmental issues, and implement its environmental strategy; (4) Congress has directed DOD to realign and justify the office's operating and administrative costs separately in future budget submissions, reduce and hold the operating and administrative budget to $366,000, and limit travel costs to $27,000; (5) future DOD environmental budgets will not be fully realigned because DOD has not separately budgeted or justified its environmental management activities; (6) the Office has agreed to reduce its budget request by $366,000 because the former environmental office supplied Congress with incorrect data on the office's total cost; (7) DOD travel costs are expected to exceed the report limit by $63,000; and (8) the Deputy Under Secretary of Defense has met with congressional staff and reached agreement on the funding limits."
United States. General Accounting Office
1994-09
-
Global Proliferation-Dynamics, Acquisition Strategies, and Responses: Volume 2-Nuclear Proliferation
"The proliferation of nuclear weapons, as well as their associated missile delivery systems, is increasingly acknowledged to be one of the most important threats to U.S. security and global stability in the emerging post-Cold War world. Prepared for the Defense Nuclear Agency (DNA), this report: a. Assesses the current proliferation situation, including incentives and disincentives for acquisition, current outcomes, and future trends. b. Highlights different weapons acquisition strategies that countries have pursued and continue to pursue. c. Describes current policies to contain, cap or rollback, or deal with proliferation. d. Identifies key policy challenges as well as new initiatives to help strengthen U.S. efforts. e. Identifies areas in which the Department of Defense (DoD) may be able to make significant contributions to U.S. nonproliferation efforts."
United States. Defense Nuclear Agency
Dunn, Lewis A.; Bailey, Charles; Bernstein, Paul I.
1994-09
-
Health Hazard Evaluation Report 92-147-2456; Federal Bureau of Investigation Washington, D.C.
"In February 1992, the National Institute for Occupational Safety and Health (NIOSH) received a request for a health hazard evaluation (HHE) from a management representative of the Federal Bureau of Investigation (FBI) in Washington, D.C. The request was submitted because of concern about possible health hazards due to the exposure of fingerprint specialists to many of the chemicals that they use in processing latent fingerprints. NIOSH evaluated potential exposures to ethyl-2-cyanoacrylate, petroleum ether, iodine, acetone, titanium dioxide, and carbon black in the fingerprint laboratories and at a simulated crime scene. The laboratories were equipped with exhaust hoods, but there was no exhaust ventilation available at the simulated crime scene. NIOSH investigators also evaluated an argon laser that was used by fingerprint specialists to examine objects for visible fingerprints"
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Barsan, Michael E.; Bresler, Faye T.
1994-09
-
Health Hazard Evaluation Report 88-0290-2460; Pittsburgh Bureau of Fire Pittsburgh, Pennsylvania
"On June 2, 1988, the International Association of Fire Fighters' (IAFF) Department of Health and Safety requested the National Institute for Occupational Safety and Health (NIOSH) to conduct a Health Hazard Evaluation (HHE) on behalf of their Local #1 in Pittsburgh, Pennsylvania. The request was to evaluate the noise exposure levels found in the activities of the Pittsburgh Bureau of Fire (PBF) and to assess the amount of hearing loss among current fire fighters in the department."
Centers for Disease Control and Prevention (U.S.); National Institute for Occupational Safety and Health
Tubbs, Randy L. (Randy Lloyd)
1994-09
-
Managing Water for Drought
"This guidebook was produced as part of the National Study of Water Management During Drought, which was managed by the Institute for Water Resources (IWR) of the U.S. Army Corps of Engineers. The guidebook is based on the experiences, research, and critical analysis of the over one hundred professionals who worked directly on the National Drought Study, and the many others who criticized and improved the case studies in which these methods were tested. […] This report summarizes the method of Many components of the DPS approach are improving water management during drought time-proven methods and ideas derived from developed during the four year National federal water planning experience and Study of Water Management During research, modified to reflect the importance Drought. The method was tested and refined of non-federal, non-structural responses to in four field studies in different parts of the droughts. The most visible innovation of country, in which teams of water managers the National Drought Study is the use of and users worked together to reduce drought stakeholders collaboratively built 'shared impacts. In each case, the situations are vision (computer) models' of their water complex, involving many different uses of management environments. The DPS water. Because such important state and method also encourages the use of alternative local responsibilities are involved, only a dispute resolution techniques and new joint cooperative approach between state and statistical methods that can provide additional federal agencies could provide satisfactory information on the expected severity and answers. These cooperative field studies were frequency of droughts. What is most called 'Drought Preparedness Studies' (DPS) significant is that all of this has been and the approach, the 'DPS method.'"
Institute for Water Resources (U.S.)
Werick, William J.; Whipple, William, Jr.
1994-09
-
Military Applicant Security Screening (MASS): Systems Development and Evaluation
From the Foreword: "The present study couples instruments and procedures developed in previous research with computer technology, to design a computer-administered security screening system entitled Military Applicant Security Screening (MASS). In this report the authors describe the two major components of MASS, the screening questionnaire and the computer structure for questionnaire administration. Also described are the results of a field test of MASS with Navy enlisted personnel. The positive results from this test resulted in a decision by the Navy to implement MASS nationwide at all Military Entrance Processing Stations (MEPS)."
Defense Personnel Security Research Center (U.S.)
Wiskoff, Martin F.; Zimmerman, Ray A.
1994-09
-
Assessing the Potential for Civil-Military Integration: Technologies, Processes, and Practices
Government officials and private sector executives have advocated the integration of the defense and commercial sectors (often termed civil-military integration or CMI). The claimed benefits of CM I include cost savings, increased technology transfer, and an increase the number of potential defense suppliers. A CM I strategy, however, demands extensive modification of acquisition laws and regulations, and concerns over potential costs and risks such modifications have hindered change. Although several congressional and administration initiatives have been launched to promote integration, to date, much of the defense base remains isolated and the promised benefits of integration remain elusive. This assessment found that greater CMI is possible. It confirms the potential for cost savings and increased technology transfer, but analysis indicates such savings are likely to be less, and slower to realize, than many previous studies have suggested. Even so, cost savings even a few percent of total defense technology and industrial spending would amount to billions of dollars in overall savings that might be used to meet other vital defense needs. The most important benefit of increased CMI may be the preservation of a viable defense technology and industrial capability in an increasingly fiscally constrained environment. Increased CMI appears essential if defense is to take advantage of rapidly developing commercial technologies.
United States. Government Printing Office
United States. Congress. Office of Technology Assessment
1994-09
-
Taxonomy of Computer Program Security Flaws, with Examples
"An organized record of actual flaws can be useful to computer system designers, programmers, analysts, administrators, and users. This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the open literature, but in widely separated places. For those new to the field of computer security, they provide a good introduction to the characteristics of security flaws and how they can arise. Because these flaws were not randomly selected from a valid statistical sample of such flaws, we make no strong claims concerning the likely distribution of actual security flaws within the taxonomy. However, this method of organizing security flaw data can help those who have custody of more representative samples to organize them and to focus their efforts to remove and, eventually, to prevent the introduction of security flaws."
Naval Research Laboratory (U.S.)
Landwehr, Carl E.; Bull, Alan R.; McDermott, John P. . . .
1994-09