About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Report of the Invitational Workshop on Data Integr


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

ADDENDUM FOR

COMPUTER SYSTEMS PUBLICATIONS LIST 88

Computer Security

NIST SPEC PUB
500-168
REPORT OF THE INVITATIONAL WORKSHOP ON DATA
INTEGRITY
By Zella G. Ruthberg and William T. Polk
September 1989 SN 003-003-02966-1
Order from GPO

This report contains the proceedings of the second
invitational workshop on computer integrity issues
which took place on January 25-27, 1989 at NIST.
The first invitational workshop took place in
October 1987 and addressed integrity policy in
computer information systems; proceedings were
published as NIST Special Publication 500-160. This
follow-on workshop focused on data integrity models,
data quality, integrity controls, and certification
of transformation procedures that preserve data
integrity.
NIST SPEC PUB
500-166 COMPUTER VIRUSES AND RELATED THREATS: A MANAGEMENT
GUIDE
By John P. Wack and Lisa J. Carnahan
August 1989 SN 003-003-02955-6 $2.50
Order from GPO

This document contains guidance for managing the
threats of computer viruses and related software and
unauthorized use. It is geared towards managers of
end-user groups, managers dealing with multi-user
systems, personal computers and networks. The
guidance is general and addresses the
vulnerabilities that are most likely to be
exploited.
Data Management Technology

NIST SPEC PUB
500-167 INFORMATION MANAGEMENT DIRECTIONS: THE INTEGRATION
CHALLENGE
Elizabeth N. Fong and Alan H. Goldfine, Editors
September 1989 SN 003-003-02973-4
Order from GPO
This report constitutes the proceedings of a three-
day workshop on Information Management Directions
held in Fort Lauderdale, FL on October 31-November
2, 1988. NCSL sponsored the workshop in cooperation
with the Association for Computing Machinery (ACM),
the IEEE Computer Society, and the Federal Data
Management Users Group. The workshop focused on
issues related to integration and productivity.
NBSIR 88-3701
(supersedes
NBSIR 85-3165) USING THE INFORMATION RESOURCE DICTIONARY SYSTEM
COMMAND LANGUAGE (Second Edition)
By Alan Goldfine
January 1988 PB 88169545 $15.95
Order from NTIS

This document introduces and provides examples of
the Command Language of the Information Resource
Dictionary System (IRDS). A dictionary maintained
by the U.S. Air Force is defined in the IRDS and
used as a continuing example throughout the
document. The dictionary is populated, manipulated,
and reported on using the precise syntax of the
Command Language.
NBSIR 88-3700
(supersedes
NBSIR 85-3164) A TECHNICAL OVERVIEW OF THE INFORMATION RESOURCE
DICTIONARY SYSTEM (Second Edition)
By Alan Goldfine and Patricia Konig
January 1988 PB 88163779 $21.95
Order from NTIS

This publication provides a technical overview of
the computer software specifications for an
Information Resource Dictionary System (IRDS). It
summarizes the data architecture and the software
functions and processes of the IRDS. This overview
also provides background information on the
development of the IRDS software specifications
networks.
Networks
NIST SPEC PUB
500-163 GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE
USERS' GUIDE
By Tim Boland
August 1989 PB 90-111212 $23.00
Order from NTIS

This publication assists federal agencies in
planning for the introduction of Government Open
Systems Interconnection Profile (GOSIP)-compliant
products into the workplace. For use by federal
procurement specialists, technical specialists, and
managers, the guide provides tutorial information on
Open Systems Interconnection (OSI) protocols as well as information on OSI registration, OSI procuret,
GOSIP technical evaluation, and GOSIP transition
strategies.

NISTIR 89-4160 TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI)
PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK
(ISDN)
by Carol A. Edgar August 1989 PB 89235576 $13.95
Order from NTIS

This report contains the results of a trial
demonstration of OSI protocols over ISDN. NIST
organized the trial to demonstrate the use of ISDN
as a lower layer technology for OSI applications.
The trial was a necessary first step for including
ISDN as a lower layer technology in the Government
Open Systems Interconnection Profile (GOSIP) Version
2.
NISTIR 89-4140 WORKING IMPLEMENTATION AGREEMENTS FOR OPEN SYSTEM
INTERCONNECTION PROTOCOLS
Tim Boland, Editor
September 1989 PB 89235931 $36.95
Order from NTIS

This publication records working implementation
specification agreements of OSI protocols among the
organizations participating in the NIST Workshop for
Implementors for OSI Plenary Assembly held June 16,
1989. This work may be the basis of future stable
agreements; the current version of the stable
agreements is contained in NIST Special Publication
500-162.
Software Development and Management

NIST SPEC PUB
500-165 SOFTWARE VERIFICATION AND VALIDATION: ITS ROLE IN
COMPUTER ASSURANCE AND ITS RELATIONSHIP WITH
SOFTWARE PROJECT MANAGEMENT STANDARDS
By Dolores R. Wallace and Roger U. Fujii
September 1989 SN 003-003-02959-9 $2.25
Order from GPO

This publication describes how software verification
and validation methodology and standards provide a
strong framework for developing quality software.
Software verification and validation is a broad
systems engineering approach to ensure software
quality and gain optimum software performance. The
approach supports the requirements for project
management and quality assurance and, when used with
other software engineering standards, helps to
produce secure, reliable, and maintainable software
programs.

System Selection and Evaluation

NISTIR 89-4128 PROCESSING RATE SENSITIVITIES OF A HETEROGENEOUS
MULTIPROCESSOR
By Gordon Lyon
August 1989 PB 89229017 $13.95
Order from NTIS

A simple performance estimator and alternate
scheduling schemes can, from very modest effort,
highlight some first-order improvement tradeoffs in
multiprocessors. An application example of a
quicksort is used to demonstrate the approach.
NISTIR 89-4053 ARCHITECTURALLY FOCUSED BENCHMARKS WITH A
COMMUNICATION EXAMPLE
By G.E. Lyon and R.D. Snelick
March 1989 PB 89216477 $13.95
Order from NTIS

This publication sketches a framework of modalities
for an architecturally focused performance
evaluation. The result is a hybrid of benchmarking
and modeling; elements of capacity-and-use trees,
CUTS, are explored as a simplified notation. A
description of the structure and preliminary results
from a practical benchmark set for process
communication are also given.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS