SEARCH THE HSDL

Advanced search    Help

Results  1 - 21 (of 21)          sort by relevance     sorted by date

Clear all search criteria


The Cyber Infrastructure Collection is a partnership of The Institute for Information Infrastructure Protection (I3P) and the HSDL. It is focused on identification of information assets in the broad area of information infrastructure protection and cyber security. The I3P, founded by Dartmouth College and now at George Washington University, is a consortium of leading research institutions dedicated to strengthening the cyber infrastructure of the United States. Its effort in this partnership was sponsored by the National Institute of Standards and Technology (NIST). [Note: this collection was acquired by the HSDL in 2008 and is not actively updated.]

  • Country Reports on Terrorism 2006
    United States. Department of State
    2007-04
  • National Strategy for Aviation Security
    United States. White House Office
    2007-03-26
  • Ontology of Identity Credentials, Part 1: Background and Formulation
    National Institute of Standards and Technology (U.S.)
    MacGregor, William; Dutcher, William; Khan, Jamil
    2006-10
  • Quality of Security Service : Adaptive Security [preprint version]
    Naval Postgraduate School (U.S.). Center for Information Systems Security Studies and Research
    Irvine, Cynthia E.; Levin, Timothy E.; Spyropoulou, Evdoxia
    2005-12-01
  • Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting
    United States. Office of Management and Budget
    2003-08-03
  • Pipeline Rupture and Subsequent Fire in Bellingham, Washington June 10, 1999: Accident Investigation Presentations [website]
    United States. National Transportation Safety Board
    2002-10-08
  • Global Climate Change and Transportation Infrastructure: Lessons from the New York Area
    Center for Climate Change & Environmental Forecasting (U.S.)
    Zimmerman, Rae
    2002-10-01
  • Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
    National Institute of Standards and Technology (U.S.)
    Barker, Elaine B.; Soto, Juan; Rukhin, Andrew
    2001-05-15
  • Data Encryption Standard (DES)
    National Institute of Standards and Technology (U.S.)
    1999-10-25
  • Entity Authentication Using Public Key Cryptography
    National Institute of Standards and Technology (U.S.)
    1997-02-18
  • Federal Legal Landscape: A 'Legal Foundations' Study: Report 2 of 12: Report to the President's Commission on Critical Infrastructure Protection
    United States. President's Commission on Critical Infrastructure Protection
    1997
  • Federal Government Model Performance: A 'Legal Foundations' Study: Report 11 of 12: Report to the President's Commission on Critical Infrastructure Protection
    United States. President's Commission on Critical Infrastructure Protection
    1997
  • Government Incentive Tools: A Study: Report to the President's Commission on Critical Infrastructure Protection
    United States. President's Commission on Critical Infrastructure Protection
    1997
  • Legal Foundations: Studies and Conclusions: Report 1 of 12: Report to the President's Commission on Critical Infrastructure Protection
    United States. President's Commission on Critical Infrastructure Protection
    1997
  • Telecommunications Security Guidelines for Telecommunications Management Network
    National Institute of Standards and Technology (U.S.)
    Kimmins, John; Dinkel, Charles; Walters, Dale
    1995-10
  • Good Security Practices for Electronic Commerce, Including Electronic Data Interchange
    National Institute of Standards and Technology (U.S.)
    1993-12
  • Establishing a Computer Security Incident Response Capability (CSIRC)
    National Institute of Standards and Technology (U.S.)
    Wack, John P.
    1991-11
  • Password Usage
    United States. Department of Commerce
    1985-05-30
  • Guidelines for Security of Computer Applications
    United States. Department of Commerce
    1980-06-30
  • Computer Security Threat Monitoring and Surveillance
    National Institute of Standards and Technology (U.S.)
    1980-04-15
  • National Vulnerability Database [website]
    United States. Department of Homeland Security
      1