Research Menu

.
Skip Search Box

Publications

Research Articles

Our researchers publish articles on emerging technologies, written to inform technical managers and others who need to keep current in technology but are not active in research. You may be interested in the following:

The Next Wave Date Format
Issue 19 - 2, Developing a blueprint for a science of cybersecurity March 2012
Guest Editor's column March 2012 Article
Cybersecurity: From engineering to science March 2012 Article
The evolution of information security March 2012 Article
Making experiments dependable March 2012 Article
On bugs and elephants: Mining for a science of security March 2012 Article
Programming language methods for compositional security March 2012 Article
Proof - carrying data: Secure computation on untrusted platforms March 2012 Article
Blueprint for a science of cybersecurity March 2012 Article
Issue 17 - 4, Cloud Computing Date Format
An Overview of Cloud Computing July 2009 Article
The Future is Virtually Here July 2009 Article

Research Papers

Our researchers publish and disseminate their work in scholarly publications and at conferences. You may be interested in the following:

Title Author Date Format
Closed-form Maker fringe formulas for poled polymer thin films in multilayer structures Dong Hun Park and Warren N. Herman January 2012 Paper
Understanding the damping of a quantum harmonic oscillator coupled to a two-level system using analogies to classical friction M. Bhattacharya, M. J. A. Stoutimore, K. D. Osborn, and Ari Mizel This paper has been submitted to the American Journal of Physics. After it is published, it will be found at http://scitation.aip.org/ajp/ Paper
The Sliding Shortest Path Algorithm Ramesh Bhandari, Ph.D. September 2010 Paper
Optical Networking for Quantum Key Distribution andQuantum Communications N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, K T Tyagi, J Jackel, M S Goodman, L Mercer, and H Dardy March 2009 Paper
Dense Wavelength Multiplexing of 1550 nm QKD with Strong Classical Channels in Reconfigurable Networking Environments N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, and K T Tyagi 2009 Paper
Progress toward Quantum Communications Networks: Opportunities and Challenges R J Runser, T Chapuran, P Toliver, N A Peters, M S Goodman, J T Kosloski, N Nweke, S R McNown, R J Hughes, D Rosenberg, C G Peterson, K P McCabe, J E Nordholt, K Tyagi, P A Hiskett, and N Dallmann 2007 Paper
2001 Linux 2.5 Kernel Summit Presentation on SELinux Peter Loscocco July 2001 Presentation
2003 Ottawa Linux Symposium BOF Presentation Stephen Smalley July 2003 Presentation
A Security Policy Configuration for the Security-Enhanced Linux Stephen Smalley and Timothy Fraser February 2001 Abstract

Technical Report
Configuring the SELinux Policy Stephen Smalley January 2003 Abstract

Technical Report
Implementing SELinux as a Linux Security Module Stephen Smalley, Chris Vance and Wayne Salamon May 2002 Abstract

Technical Report
Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco and Stephen Smalley February 2001 Abstract

Technical Report
Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco and Stephen Smalley June 2001 Abstract

Technical Report
Meeting Critical Security Objectives with Security-Enhanced Linux Peter Loscocco and Stephen Smalley July 2001 Abstract

Paper
Securing the X Window System with SELinux Doug Kilpatrick, Wayne Salamon and Chris Vance March 2003 Abstract

Technical Report
The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau August 1999 Abstract

Paper
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter Loscocco, Stephen Smalley, Patric Muckelbauer, Ruth Taylor, S. Jeff Turner, and John Farrell October 1998 Abstract

Paper
 

Date Posted: Jan 15, 2009 | Last Modified: Jul 02, 2012 | Last Reviewed: Jul 02, 2012

 
bottom

National Security Agency / Central Security Service