HostedDB - Dedicated UNIX Servers

fips191_50 FIPS PUB 191 References [MART89] Martin, James, and K. K. Chapman, The Arben Group, Inc.; Local Area Networks, Architectures and Implementations, Prentice Hall, 1989. [BARK89] Barkley,  John  F.,  and  K.  Olsen;  Introduction  to  Heterogenous Computing   Environments,   NIST   Special   Publication   500-176, November, 1989. [NCSC87] A Guide to Understanding Discretionary Access Control in Trusted Systems, NCSC-TG-003, Version 1, September 30, 1987 [NCSL90] National  Computer  Systems  Laboratory  (NCSL)  Bulletin,  Data Encryption Standard, June, 1990. [SMID88] Smid,  Miles,  E.  Barker,  D.  Balenson,  and  M.  Haykin;  Message Authentication Code (MAC) Validation System: Requirements and Procedures, NIST Special Publication 500-156, May, 1988. [OLDE92] Oldehoeft, Arthur E.; Foundations of a Security Policy for Use of the National Research and Educational Network, NIST Interagency Report, NISTIR 4734, February 1992. [COMM91]     U.S.     Department     of     Commerce     Information     Technology Management  Handbook,  Attachment  13-D:  Malicious  Software Policy and Guidelines, November 8, 1991. [WACK89] Wack,  John  P.,  and  L.  Carnahan;  Computer  Viruses  and  Related Threats: A Management Guide, NIST Special Publication 500-166, August 1989. [X9F292] Information Security Guideline for Financial Institutions, X9/TG-5, Accredited Committee X9F2, March 1992. [BJUL93] National  Computer  Systems  Laboratory  (NCSL)  Bulletin,  Connecting  to  the Internet: Security Considerations, July 1993. [BNOV91] National     Computer     Systems     Laboratory     (NCSL)     Bulletin,     Advanced Authentication Technology, November 1991. [KLEIN] Daniel  V.  Klein,  "Foiling  the  Cracker:  A  Survey  of,  and  Improvements  to, 52