TITLE

Access Control and Homeland Security

AUTHOR(S)
Dingle, Jeffrey
PUB. DATE
November 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p34
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the acceptance of an access control program and the adoption of its policies in order to be more effective in the U.S. Homeland Security Presidential Directive 12 mandated the establishment of standard for identification of Federal government employees and contractors. However, National Institute of Standards and Technology published Federal Information Processing Standards Publication 201 to produce a standard for secure and forms of identification.
ACCESSION #
23152517

 

Related Articles

  • Standard Bearers. Peters, Katherine Mclntire // Government Executive;Jan2003, Vol. 35 Issue 1, p41 

    Focuses on the role played by scientists at the National Institute of Standards and Technology (NIST) in homeland security in the U.S. Development of terrorism-related standards by the scientists; Method used by them to tackle bio-terrorism; Details of the law enforcement program of NIST.

  • Facilities readiness.  // Industrial Engineer: IE;Oct2005, Vol. 37 Issue 10, p16 

    This article reports that the U.S. National Institute of Standards and Technology (NIST) economists have released risk assessment software that building owners and managers can use to identify and guard against terrorist threats to their facilities. Developed as part of NIST's commitment to...

  • Access Control, the Government Version. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p44 

    The article reports on the standards set by the Federal government to manage access in the U.S. These include the Homeland Security Presidential Directive number 12 (HSPD-12), which demands the implementation of a common security card to be issued to all federal employees and contractors, the...

  • NIST Releases Draft Guidance On Mobile Credentials. Gormisky, Liz // Defense Daily;3/7/2014, p3 

    The article discusses the draft guidance released by the National Institute of Standards and Technology on the use of derived credentials for smartphone-based authentication on federal networks in the U.S. The guidance also includes standards for mobile device developers who want to market their...

  • Role Engineering: Methods and Standards. Coyne, Edward J.; Weil, Timothy R.; Kuhn, Rick // IT Professional;Nov/Dec2011, Vol. 13 Issue 6, p54 

    Most of today's large firms use some form of role-based access control (RBAC) to support thousands of users and permission controls. Recognizing the need for some commonality among the various RBAC models, the National Institute of Standards and Technology proposed the NIST Model for RBAC in...

  • NIST Releases Draft Guidance On Mobile Credentials. Gormisky, Liz // Defense Daily;3/10/2014, p1 

    The National Institute of Standards and Technology (NIST) released draft guidance Friday on derived credentials for authenticating mobile devices on federal networks. Users who wantÂ…

  • NIST database tracks software weaknesses. Roberts, Paul F. // eWeek;8/22/2005, Vol. 22 Issue 33, p31 

    The article reports that the U.S. federal government, often criticized for its slow response to security vulnerabilities and attacks, has launched a new database of software flaws designed to help IT administrators stay ahead of attacks that use those holes. The National Vulnerability Database...

  • GAMMA-RAY EMITTING TEST SOURCES FOR PORTAL MONITORS USED FOR HOMELAND SECURITY. Lucas, L.; Pibida, L.; Unterweger, M.; Karam, L. // Radiation Protection Dosimetry;2005, Vol. 113 Issue 1, p108 

    The National Institute of Standards and Technology developed a new set of test sources for testing of portal monitors against the ANSI standard N42.35-2004. The design and source specifications are provided in this work.

  • Securing the Hole in RFID Security. Strauch, Andrew // Wireless Design & Development;Oct2007 Supplement, Vol. 15, pS6 

    The article focuses on the need to secure the radio frequency identification (RFID) systems tag. It provides information on a report on guidelines for securing RFID systems issued by the U.S. National Institute of Standards and Technology (NIST). It also stresses the need for RFID tags to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics