CSL FOCUSES ON TEXT RETRIEVAL TECHNOLOGIES CSL researchers are working with other research organizations to stimulate new technologies in text retrieval. Since 1992, CSL and the Advanced Research Projects Agency (ARPA) have co- sponsored an annual Text REtrieval Conference (TREC) at NIST to bring together information retrieval researchers from industry and academia. From the beginning, there has been an almost equal number of universities and companies participating, with an emphasis on looking at many different approaches to text retrieval from very large collections of documents. Held November 2-4, 1994, TREC-3 was attended by 150 people from 33 participating groups (14 companies, 19 universities) working on selected topics from a large test collection. Each group selected one of three levels of participation: full participation, full participation using a reduced dataset (1/4th of the full document set), or evaluation only. Each group was provided test data and asked to turn in either one or two sets of results for each topic. Groups could choose to do the routing task (same questions always asked but new data being searched), the adhoc task (new questions being asked against a static set of data), or both tasks, and were asked to submit the top 1000 documents retrieved for each topic for evaluation. Participants reported on a wide variety of retrieval techniques, including methods using automatic thesauri, sophisticated term weighting, natural language techniques, relevance feedback, and advanced pattern matching. A common evaluation package was used to measure results, allowing groups to compare the effectiveness of different techniques and discuss how differences between the systems affected performance. For the first time, TREC-3 introduced a second language, Spanish, to the task, with four groups working with a small Spanish collection in addition to their work in English. NIST Special Publication 500-225, Overview of the Third Text REtrieval Conference (TREC-3), contains the proceedings of the conference. The document is available for sale by the Government Printing Office at (202) 512-1800; order number SN003-003-03328- 6, price $36.00. CRYPTOGRAPHIC MODULE VALIDATION PROGRAM ANNOUNCED On July 17, 1995, CSL and the Communications Security Establishment (CSE) of the Government of Canada jointly announced the establishment of the Cryptographic Module Validation Program (CMVP). Products validated by this program as conforming to FIPS 140-1, Security Requirements for Cryptographic Modules, will be accepted for use in both Canada and the United States for the protection of sensitive, unclassified information. Both organizations are encouraging their respective federal agencies to begin specifying, in their procurements, validated products from the FIPS 140-1 register. The NIST Cryptographic Module Validation Program requires accredited, independent, third-party testing laboratories to test products for FIPS 140-1 validation. The National Voluntary Laboratory Accreditation Program (NVLAP) announced that two laboratories have been accredited to date to perform FIPS 140-1 testing: CEAL: a CygnaCom Solutions Laboratory, McLean, Virginia; and InfoGard Laboratories, San Luis Obispo, California. FIPS 140-1, the CMVP register, and the list of NVLAP accredited laboratories may be obtained electronically from: http://csrc.nist.gov. For more information, contact Lisa Carnahan at 301-975-3362, lcarnahan@nist.gov. CSL WORKS WITH INDUSTRY TO STUDY DATA STORAGE STANDARDS ISSUES Preserving the integrity of data which is stored electronically becomes increasingly significant for users as the amount of information processed by computer systems proliferates. NIST has been collaborating with industry and government organizations in developing measurements, evaluation techniques, and standards for long-term computer data storage. Responding to industry requirements for data integrity and future standards for optical tape media, devices and applications, researchers from NIST's Computer Systems Laboratory are participating in the Optical Tape Study Group established by the Association for Informational and Image Management (AIIM) International. All interested parties are invited to attend the group's first meeting on August 17-18, 1995, at AIIM Headquarters, 1100 Wayne Ave., 11th Floor, Silver Spring, MD 20910. Discussion topics will include the data integrity of optical tapes, metrology, media/drive specifications, and possible future standards. Industry organizations expected to participate in the study group include 3M, Apex, Callicott, Central Imaginery Office, Eastman Kodak, E-MASS, E-Systems, ICI Imagedata, IIT Research Institute, Lots Technology, Mobil Oil, Philips, Polaroid, PrimeLink, StorageTek, SAIC, Technology Solutions, and Terabank Systems. For more information, contact Fernando Podio, Chair, Optical Tape Study Group, at (301) 975-2947, fernando@pegasus.ncsl.nist.gov. FEDERAL INFORMATION PROCESSING STANDARDS (FIPS) ACTIVITIES Secretary of Commerce Approves Revised FIPS for Open Systems and Network Management The Secretary of Commerce recently approved two revised standards: FIPS 146-2, Profiles for Open Systems Internetworking Technologies (POSIT), and FIPS 179-1, Government Network Management Profile (GNMP). Effective immediately, FIPS 146-2 removes the requirement that federal agencies specify Government Open Systems Interconnection Profile (GOSIP) protocols when they acquire networking products and services and communications systems and services. FIPS 179-1 provides implementations for network management based on the service and protocol standards issued by the International Organization for Standardization (ISO). These revised standards promote the interoperability of computers and sysstems that are acquired from different manufacturers in an open systems environment. FIPS for Secure Hash Standard Revised Also approved was a revision to FIPS 180, Secure Hash Standard (SHS), which will be published as FIPS 180-1. Effective October 2, 1995, FIPS 180-1 adds a technical revision to the algorithm of the message digest which enhances the security of the standard when used with digital signatures. Requirements for a Data Standard for Record Description Records Under Consideration CSL is considering requirements for a standard for the data elements which, when taken together, will describe information objects of many different kinds, both electronic and non- electronic. These requirements could be met through a wide range of information-creating software products as well as document management and object repository software products. CSL solicited comments on the scope, purpose, background, and rationale for the record description records. FIPS for Public Key Cryptographic Entity Authentication Mechanisms Proposed CSL is proposing a FIPS for Public Key Cryptographic Entity Authentication Mechanisms, which will specify two challenge- response mechanisms by which entities in a computer system may authenticate their identities to one another. The standard defines protocols which are derived from an international standard for entity authentication based on public key cryptography using digital signatures and random number challenges. We welcome comments on the proposed FIPS by September 5, 1995. Information on the proposal is available from the FIPS Office at (301) 975-2816. Proposed FIPS for Standard for the Exchange of Product Model Data (STEP) Also proposed is a FIPS for STEP that will adopt the voluntary industry specification International Organization for Standardization (ISO) Product Data Representation and Exchange, ISO 10303:1994. STEP defines and describes all product data used during the manufacturing life-cycle of a product, the production steps needed to make and product, and the order in which they occur. Comments of this proposed standard must be received by September 5, 1995. The proposed FIPS is available from the FIPS Office at the above number. UPDATE ON NEW PUBLICATIONS CSL publishes the results of studies, investigations, and research. The reports listed below may be ordered from the following sources as indicated for each: *Superintendent of Documents U.S. Government Printing Office (GPO) Washington, DC 20402 Telephone (202) 512-1800 Fax (202) 512-2250 *National Technical Information Service (NTIS) 5285 Port Royal Road Springfield, VA 22161 Telephone (703) 487-4650 Rush Service (800) 553-6847 Fax (703) 321-8547 or (703) 321-9038 Overview of the Third Text Retrieval Conference (TREC-3) D. K. Harman, Editor NIST Spec. Pub. 500-225 April 1995 SN003-003-03328-6 $36.00 Order from GPO This report constitutes the proceedings of the third Text REtrieval Conference (TREC-3) held in Gaithersburg, Maryland, November 2-4, 1994. Self Monitoring Accounting Systems By Roger Sies NIST Spec. Pub. 500-226 March 1995 SN003-003-03324-3 $1.75 Order from GPO This report focuses on the need for more dependable accounting and financial systems in the federal government. It recommends a service for use by management in performing self audits of financial systems which can provide more internal control and financial information than current practices. ELECTRONIC ACCESS: BLUEPRINT for the National Archives and Records Administration By Judi Moline and Steve Otto NIST Spec. Pub. 500-227 April 1995 SN003-003-03330-8 $4.50 Order from GPO This report provides a blueprint for an electronic access system that would allow citizens in remote areas to receive information maintained by the National Archives and Records Administration that documents the history of the American people. Computer Systems Laboratory Annual Report 1994 By Elizabeth Lennon, Shirley Radack, and Ramona Roach NISTIR 5576 February 1995 PB95-209920 $27.00 paper Order from NTIS $12.50 microfiche This report describes the information technology activities and accomplishments of the laboratory for 1994. A Study on Hazard Analysis in High Integrity Software Standards and Guidelines By Laura M. Ippolito and Dolores R. Wallace NISTIR 5589 January 1995 PB95-198727 $19.50 paper Order from NTIS $ 9.00 microfiche This report presents the results of a study on hazard analysis, especially software hazard analysis, in high integrity software standards and guidelines. Proceedings Report of the International Invitation Workshop on Development Assurance By P. Toth NISTIR 5590 January 1995 PB95-189494 $17.50 paper Order from NTIS $ 9.00 microfiche This publication presents the proceedings of an invitational workshop on development assurance held in June 1994. Co-sponsors of the workshop were NIST, the National Security Agency, the Canadian Communications Security Establishment, and the European Commission. Application Software Interface: ISDN Services for an Open Systems Environment By D.P. Stokesberry NISTIR 5595 February 1995 PB95-199329 $17.50 paper Order from NTIS $ 9.00 microfiche This report focuses on a standard means of specifying the interface between applications and one of the communications subservices available in modern computer systems. Object-Oriented Technology Research Areas By Wayne J. Salamon and Dolores R. Wallace NISTIR 5600 January 1995 PB95-199329 $17.50 paper Order from NTIS $ 9.00 microfiche This paper discusses issues surrounding object technology. Topics covered include object-oriented (OO) development methodologies, measuring the quality of OO software, testing, the use of OO technology in high integrity systems, and distributed object computing. An Electronic Implementors' Workshop By Ted Landberg, Robert Bagwill, and Brenda Gray NISTIR 5623 March 1995 PB95-210936 $17.50 paper Order from NTIS $ 9.00 microfiche This publication describes the various elements of an electronic workshop and provides a list of capabilities needed to operate one. Validated Products List 1995 No. 2 (2 volumes) Judy Kailey, Editor NISTIR 5629 April 1995 PB95-937302 $36.50 paper Order from NTIS $146.00 subscription This two-volume document, published quarterly, identifies the COBOL, FORTRAN, Pascal, C, MUMPS, and Ada programming language processors with current validation certificates and the SQL language processors with registered test reports. Also included are NIST POSIX Testing Laboratories and Validated Products, Graphics, and Computer Security testing programs. Volume 2 presents GOSIP Conformance Testing Registers. An Analysis of ANSI ASC X12 and UN/EDIFACT Electronic Data Interchange Standards By Robert Aronoff and Karen Hsing NISTIR 5631 April 1995 PB95-220554 $17.50 paper Order from NTIS $ 9.00 microfiche This paper looks at the general approach common to the ANSI ASC X12 standards and the UN/EDIFACT standards in providing syntactical and semantic aspects of Electronic Data Interchange (EDI). Persistent Object Base System Testing and Evaluation By Elizabeth Fong NISTIR 5636 April 1995 PB95-220588 $19.50 paper Order from NTIS $ 9.00 microfiche This report summarizes CSL's role in support of the Advanced Research Projects Agency (ARPA) in the testing and evaluation of persistent object base (POB) systems. UPCOMING TECHNICAL CONFERENCES Open System Environment (OSE) Implementors' Workshop (OIW) This workshop is part of a continuing series to develop implementation specifications from international standard design specifications for computer network protocols. Sponsors: NIST and the IEEE Computer Society Dates: September 11-14, 1995 Place: NIST, Gaithersburg, MD Contact: Brenda Gray (301) 975-3664 E-mail: bgray@sst.ncsl.nist.gov North American ISDN Users' Forum (NIUF) The NIUF addresses many concerns over a broad range of Integrated Services Digital Network (ISDN) issues and seeks to reach consensus on ISDN Implementation Agreements. Participants include ISDN users, implementors, and service providers. Dates: September 26-28, 1995 Place: Long Branch, NJ Contact: Sara Caswell (301) 975-2937 E-mail: sara@isdn.ncsl.nist.gov Federal Wireless Users Forum (FWUF) This users group was established to address wireless digital interface issues in the federal government. The forum encourages the participation of state and local government, other interested users, product providers, and service providers. Sponsors: NIST and the National Communications System (NCS) Date: To be announced Place: To be announced Contact: Mary Ruhl (301) 975-2983 E-mail: mruhl@nist.gov 18th National Information Systems Security Conference Formerly the National Computer Security Conference, this annual national conference has as its theme "Making Security Real." It provides a forum for traditional security concerns, as well as security issues associated with the emerging National Information Infrastructure (NII). Conference tracks will address the following: Technical Challenges, Solutions, Criteria and Assurance, Management and Administration, The Internet and Beyond, and The Tutorial Track. Sponsors: NIST and the National Computer Security Center Date: October 10-13, 1995 Place: Baltimore Convention Center Contact: Irene Gilbert-Perry (301) 975-3360 E-mail: igilbert@csmes.ncsl.nist.gov Lecture Series on High Integrity Systems This lecture series addresses problems and solutions for developing and operating high integrity systems. Dates: October 10, 1995, 2:00p.m. November 28, 1995, 2:00p.m. December 12, 1995, 2:00p.m. Place: NIST Green Auditorium Contact: Dolores Wallace (301) 975-3340 E-mail: wallace@sst.ncsl.nist.gov Mugshot and Facial Image Standards Workshop The goals of this workshop are to identify common elements and formats for capturing, processing, and exchanging electronic facial images, to define requirements, and to develop consensus about a set of voluntary standards or guidelines for the exchange of digital mugshots. Sponsors: NIST in cooperation with the FBI Dates: October 23-25, 1995 Place: Gaithersburg Hilton Hotel Contact: Michael McCabe (301) 975-2932 E-mail: mccabe@pegasus.ncsl.nist.gov Applications Portability Profile (APP)/Open Systems Environment (OSE) Workshop This workshop is designed as a user's forum to discuss the latest developments in the APP/OSE. Date: November 7-8, 1995 May 7-9, 1996 November 5-7, 1996 Place: NIST, Gaithersburg, MD Contact: Joe Hungate (301) 975-3368 E-mail: hungate@sst.ncsl.nist.gov  --=====================_807911399==_--