Skip to Main Content
Idaho State University home

[1] [2] [3] [4] [5] [6]

Government Documents

Federal Information Processing Standards
Document Title Reference # or Description
Guideline for the use of Advanced Authentication Technology Alternatives FIPS 190 9/94
Guidelines for ADP Contingency Planning FIPS 87 3/81
Guidelines for Automated Data Processing Physical Security and Risk Management FIPS 31 6/74
Guidelines for Implementing Using the NBS Data Encryption Standard FIPS 74 4/81
Guidelines for Password Usage - Password Management Guide FIPS 112 5/85
Guidelines for Security of Computer Applications FIPS 73 6/80
Integration Definition for Function Modeling FIPS 183 12/93
Integration Definition for Information Modeling FIPS 184 12/93
Key Management Using ANSI X9.17 FIPS 171; 04/92
Representation of calendar date for Information Interchange FIPS 4-2 11/98
Secure Hash Standard FIPS 180; 05/93
Secure Hash Standard Update FIPS 180-1; 05/95
Secure Hash Standard Update FIPS 180-2 8/02
Secure Hash Standard w/change notice FIPS 180-2 W/CHG 8/02
Security Requirements for Cryptographic Modules FIPS 140-1
Security Requirements for Cryptographic Modules Change Notice FIPS 140-2 1/94
Spatial Data Transfer Standard FIPS 173-1 6/94
Standard for Metropolitan Areas... FIPS 8-6 3/95
Standard Security Label for Information Transfer FIPS 188 9/94
Standard Security Label for the Government Open Systems Interconnection Profile (Draft) FIPS 1992
Table of Organizations and Codes - Legislative Branch FIPS 95-2
The Keyed-Hash Message Authentication Code FIPS 198-A 3/02
(TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System NCSC-TG 020A; 04/91
Certification and Accreditation Concepts NCSC-TG 029; 01/94
Computer Security Subsystems NCSC TG-009; 09/88
Computer Viruses - Prevention, Detection, and Treatment NCSC 1989
Guide to Understanding Audit in Trusted Systems NCSC TG-001; 07/87
Guide to Understanding Configuration Management in Trusted Systems NCSC TG-006; 03/88
Guide to Understanding Data Remanence in Automated Information Systems NCSC TG-025; 09/91
Guide to Understanding Design Documentation NCSC TG-007 V1 1989
Guide to Understanding Discretionary Access Control in Trusted Systems NCSC TG-003; 09/87
Guide to Understanding Identification and Authentication in Trusted Systems NCSC TG-017 V1 1990
Document Title Reference # or Description

[1] [2] [3] [4] [5] [6]