fips191_50
FIPS PUB 191
References
[MART89]
Martin, James, and K. K. Chapman, The Arben Group, Inc.; Local
Area Networks, Architectures and Implementations, Prentice Hall,
1989.
[BARK89]
Barkley, John F., and K. Olsen; Introduction to Heterogenous
Computing Environments, NIST Special Publication 500-176,
November, 1989.
[NCSC87]
A Guide to Understanding Discretionary Access Control in Trusted
Systems, NCSC-TG-003, Version 1, September 30, 1987
[NCSL90]
National Computer Systems Laboratory (NCSL) Bulletin, Data
Encryption Standard, June, 1990.
[SMID88]
Smid, Miles, E. Barker, D. Balenson, and M. Haykin; Message
Authentication Code (MAC) Validation System: Requirements and
Procedures, NIST Special Publication 500-156, May, 1988.
[OLDE92]
Oldehoeft, Arthur E.; Foundations of a Security Policy for Use of
the National Research and Educational Network, NIST Interagency
Report, NISTIR 4734, February 1992.
[COMM91] U.S. Department of Commerce Information Technology
Management Handbook, Attachment 13-D: Malicious Software
Policy and Guidelines, November 8, 1991.
[WACK89]
Wack, John P., and L. Carnahan; Computer Viruses and Related
Threats: A Management Guide, NIST Special Publication 500-166,
August 1989.
[X9F292]
Information Security Guideline for Financial Institutions, X9/TG-5,
Accredited Committee X9F2, March 1992.
[BJUL93]
National Computer Systems Laboratory (NCSL) Bulletin, Connecting to the
Internet: Security Considerations, July 1993.
[BNOV91]
National Computer Systems Laboratory (NCSL) Bulletin, Advanced
Authentication Technology, November 1991.
[KLEIN]
Daniel V. Klein, "Foiling the Cracker: A Survey of, and Improvements to,
52