Skip to main content (Press Enter).
Toggle navigation
National Security Agency Central Security Service
National Security Agency Central Security Service
Search
Search NSA CSS:
Search
Search NSA CSS:
Search
Documentation
Interactive Process
Job Reassignment
Implementation
Decisions
Denial
Reconsideration
Confidentiality
Statutory Claims
CryptoComics
NSA.gov Navigation Menu Button
About Us
Mission & Values
Current Leadership
Former Directors
Former D/Directors
Former D/CSS
Central Security Service (CSS)
Cryptologic Centers
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
NSA/CSS Texas
Diversity, Equality & Inclusion
Accommodations & Accessibility
Discrimination Complaints
No FEAR Act & Data
Employee Resource Groups
Civil Liberties and Privacy
About
Leadership
Reports
Resources
Contact
Cryptologic Heritage
Cryptologic Heritage FAQs
Center for Cryptologic History
Pre 1952 Timeline
Pearl Harbor Review
Voices from the Past
About the NSA/CSS Insignia
Historical Figures & Publications
African Americans
Cryptologic Hall of Honor
NSA 60th Anniversary
Publications
Women
National Cryptologic Memorial
National Cryptologic Museum
About the Museum
Exhibits & Artifacts
Hours of Operation
Tours & Education Programs
Map & Directions
Office of General Counsel
Office of the Inspector General
Frequently Asked Questions
Contact NSA
What We Do
Understanding the Threat
Signals Intelligence
SIGINT FAQs
Cybersecurity
Cybersecurity Advisories & Technical Guidance
Telework and Mobile Security Guides
Threat Intelligence & Assessments
Cybersecurity Products & Services
Cybersecurity Education
Cybersecurity Careers
Partnership
Press & Public Engagements
Support to the Military
Customers & Partners
Research
Cybersecurity Research
Math Sciences Program
Computer and Analytic Sciences Research
Technology Transfer Program
Publications
Research Papers
Science of Security
News & Features
Feature Stories
Press Room
Speeches and Testimonies
Declassified Documents
The Next Wave
Digital Media Center
Video Audio Clips
Image Galleries
Publications
Resources
Students and Educators
National Centers of Academic Excellence in Cybersecurity
Centers of Academic Excellence in Cyber Operations
Criteria for Measurement for CAE in Cyber Operations Advanced
Requirements
Application
Criteria for Measurement for CAE in Cyber Operations Fundamental
application
Application
CAE-Cyber Operations Announcements
K-12 Partnership
Research Partnership
Featured Schools
UMBC
North Carolina Agricultural & Technical State University (N.C. A&T)
University of Texas San Antonio
University of Hawaii
Illinois at Urbana-Chapaign
Carnegie Mellon University
OnRamp II Program
Cybersecurity Professionals
Request an NSA Speaker
Freedom of Information Act
Open Source @ NSA
Prepublication Review
Commercial Solutions for Classified Program (CSfC)
Threat Prevention
Capability Packages
Archived Capability Packages
Components List
Archived Components List
CNSA Suite
Solution Registration
Newsletter
Trusted Integrator List
Archived Trusted Integrator List
Customer Handbook
Frequently Asked Question
Coming Soon
Points of Contact
Media Destruction Guidance
Vendor Information
Classified Material Conversion
Join our Team
Apply Now!
Career Fields
Development Programs
Student Programs
Diversity at NSA
Doing Business With Us
Getting Started
Conferences & Events
Office of Small Business Programs
Acquisition Resource Center
Business Programs and Resources
Contacts
Home
News & Features
Digital Media Center
Publications
research papers
Research Papers & Technical Reports
Understanding the damping of a quantum harmonic oscillator coupled to a two-level system using analogies to classical friction
February 2012
Author(s): M. Bhattacharya, M. J. A. Stoutimore, K. D. Osborn, and Ari Mizel; This paper has been submitted to the American Journal of Physics.
Closed-form Maker fringe formulas for poled polymer thin films in multilayer structures
January 2012
Author(s): Dong Hun Park and Warren N. Herman
The Sliding Shortest Path Algorithm
September 2010
Author(s): Ramesh Bhandari, Ph.D.
The Optical Networking for Quantum Key Distribution and Quantum Communications
March 2009
Author(s): N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, K T Tyagi, J Jackel, M S Goodman, L Mercer, and H Dardy
Dense Wavelength Multiplexing of 1550 nm QKD with Strong Classical Channels in Reconfigurable Networking Environments
2009
Author(s): N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, and K T Tyagi
Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls
2007
Author(s): Machon Gregory and Peter Loscocco
SELinux Documentation; Published in the Proceedings of the 2007 SELinux Symposium.
Progress toward Quantum Communications Networks: Opportunities and Challenges
2007
Author(s): James Carter
SELinux Documentation; Published in the Proceedings of the 2007 SELinux Symposium.
Progress toward Quantum Communications Networks: Opportunities and Challenges
2007
Author(s): R J Runser, T Chapuran, P Toliver, N A Peters, M S Goodman, J T Kosloski, N Nweke, S R McNown, R J Hughes, D Rosenberg, C G Peterson, K P McCabe, J E Nordholt, K Tyagi, P A Hiskett, and N Dallmann
Application of the Flask Architecture to the X Window System Server
2007
Author(s): Eamon Walsh
SELinux Documentation; Published in the Proceedings of the 2007 SELinux Symposium.
Implementing SELinux as a Linux Security Module
February 2006 (Revised)
Read Abstract
Author(s): Stephen Smalley, Chris Vance and Wayne Salamon
SELinux Documentation; A technical report that describes the LSM-based SELinux security module.
Configuring the SELinux Policy
February 2005 (Revised)
Read Abstract
Author(s): Stephen Smalley
SELinux Documentation; A technical report that describes how to configure the SELinux policy for the example security server.
Securing the X Window System with SELinux
March 2003
Read Abstract
Author(s): Doug Kilpatrick, Wayne Salamon and Chris Vance
SELinux Documentation; A technical report that describes a design for integrating flexible mandatory access controls into the X Window System.
Meeting Critical Security Objectives with Security-Enhanced Linux
July 2001
Read Abstract
Author(s): Peter Loscocco and Stephen Smalley
SELinux Documentation; Published in the Proceedings of the 2001 Ottawa Linux Symposium.
Integrating Flexible Support for Security Policies into the Linux Operating System
June 2001
Read Abstract
Author(s): Peter Loscocco and Stephen Smalley
SELinux Documentation; Published in the Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference.
A Security Policy Configuration for the Security-Enhanced Linux
February 2001 (Revised)
Read Abstract
Author(s): Stephen Smalley and Timothy Fraser
SELinux Documentation; A technical report that describes the original example security policy configuration that was released with the original SELinux kernel patch.
Integrating Flexible Support for Security Policies into the Linux Operating System
February 2001 (Revised)
Read Abstract
Author(s): Peter Loscocco and Stephen Smalley
SELinux Documentation; A technical report that describes the design and implementation of the original SELinux kernel patch for the Linux 2.2 kernel.
The Flask Security Architecture: System Support for Diverse Security Policies
August 1999
Read Abstract
Author(s): Ray Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
October 1998
Read Abstract
Author(s): Peter Loscocco, Stephen Smalley, Patric Muckelbauer, Ruth Taylor, S. Jeff Turner, and John Farrell
Digital Media Center
Videos & Audio Clips
Careers Videos
General NSA Videos
Information Assurance Videos
Historical/Declassified Audio
Research Videos
Image Galleries
Events
Historical/Declassified
National Cryptologic Museum
People
Places
Publications
Brochures
The Next Wave
Research Papers & Technical Reports