The advance of Web services technologies promises to have far-reaching effects on the Internet and enterprise networks. Web services based on the eXtensible Markup Language (XML), SOAP, and related open standards, and deployed in Service Oriented Architectures (SOA) allow data and applications to interact without human intervention through dynamic and ad hoc connections. Web services technology can be implemented in a wide variety of architectures, can co-exist with other technologies and software design approaches, and can be adopted in an evolutionary manner without requiring major...
The advance of Web services technologies promises to have far-reaching effects on the Internet and enterprise networks. Web services based on the eXte...
The World Wide Web (WWW) is a system for exchanging information over the Internet. At the most basic level, the Web can be divided into two principal components: Web servers, which are applications that make information available over the Internet (in essence, publish information), and Web browsers (clients), which are used to access and display the information stored on the Web servers. This document focuses on the security issues of Web servers.
The World Wide Web (WWW) is a system for exchanging information over the Internet. At the most basic level, the Web can be divided into two principal ...
In today's computing environment, there are many threats to the confidentiality of information stored on end user devices, such as personal computers, consumer devices (e.g., personal digital assistant, smart phone), and removable storage media (e.g., universal serial bus USB] flash drive, memory card, external hard drive, writeable CD or DVD). Some threats are unintentional, such as human error, while others are intentional. Intentional threats are posed by people with many different motivations, including causing mischief and disruption and committing identity theft and other fraud. A...
In today's computing environment, there are many threats to the confidentiality of information stored on end user devices, such as personal computers,...
The Extensible Configuration Checklist Description Format (XCCDF) was originally intended to be used for technical security checklists. Although this is still the primary use of XCCDF, XCCDF also has extensions into non-technical applications (e.g., owner's manuals, user guides, non-technical Federal Information Security Management Act FISMA] controls, and items considered "manual procedures").
The Extensible Configuration Checklist Description Format (XCCDF) was originally intended to be used for technical security checklists. Although this ...
This Recommendation specifies an algorithm called Galois/Counter Mode (GCM) for authenticated encryption with associated data. GCM is constructed from an approved symmetric key block cipher with a block size of 128 bits, such as the Advanced Encryption Standard (AES) algorithm that is specified in Federal Information Processing Standard (FIPS) Pub. 197 2]. Thus, GCM is a mode of operation of the AES algorithm.
This Recommendation specifies an algorithm called Galois/Counter Mode (GCM) for authenticated encryption with associated data. GCM is constructed from...
This report presents the results of the project and provides details of the response of a range of residential smoke alarm technologies in a controlled laboratory test and in a series of real-scale tests conducted in two different residential structures. The data developed in this study include measurement of temperature and smoke obscuration in addition to gas concentrations for a range of fire scenarios and residences. The results are intended to provide both insight into siting and response characteristics of residential smoke alarms and a set of reference data for future enhancements to...
This report presents the results of the project and provides details of the response of a range of residential smoke alarm technologies in a controlle...
An experimental study of the bench-scale fire performance of eighteen different commercial polymeric materials was previously conducted by the National Institute of Standards and Technology. The results of that study described the ignition resistance, self-extinguishing behavior, heat release rate (HRR), and combustion product yields of these materials using three standard bench-scale fire tests. The current report details the second of a two part study in which the relationship between bench-scale and full-scale fire performance was examined. Five of the eighteen materials characterized in...
An experimental study of the bench-scale fire performance of eighteen different commercial polymeric materials was previously conducted by the Nationa...
This report describes the provisions that were used to design and construct World Trade Center 1, 2 and 7. Included is a summary of the major provisions in the codes and standards together with the loads and load combinations that were used to design the buildings.
This report describes the provisions that were used to design and construct World Trade Center 1, 2 and 7. Included is a summary of the major provisio...
This report was prepared to support the goals and objectives of the analysis of building and fire codes and practices of the National Institute of Standards and Technology World Trade Center Investigation.
This report was prepared to support the goals and objectives of the analysis of building and fire codes and practices of the National Institute of Sta...