CSD Rolodex
Rick Kuhn
Computer Scientist
National Institute of Standards and Technology
Computer Security Division
Phone: 301-975-3337
Fax: 301-948-0279
kuhn@nist.gov
Active Projects
Publications
Biographical Information:
Rick Kuhn is a computer scientist in the Computer Security Division of the National Institute of Standards and Technology. He has authored more than 100 publications on
information security, empirical
studies of software failure, and software
assurance, and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE). He
co-developed the role based access control
model (RBAC) used throughout industry and led the effort that
established RBAC as
an ANSI standard. Previously he served as Program
Manager for the Committee on Applications and Technology of
the President's Information Infrastructure Task Force and as manager of the Software Quality
Group at NIST. Before joining NIST in 1984, he worked as a systems
analyst with NCR Corporation and the
Johns Hopkins University Applied Physics Laboratory.
He received an MS in computer science from the
University of Maryland College Park, and
an MBA from William
& Mary.
Significant Papers (or at least ones that seem to get a lot of attention):
- D.R. Kuhn, D.R. Wallace, A.J. Gallo, Jr., "Software
Fault Interactions and Implications for Software Testing",
IEEE Trans. on Software Engineering, vol. 30, no. 6, June, 2004) -
investigates number of interactions required to trigger failures in various types of systems; basis for our combinatorial testing project.
- D.R. Kuhn, "Fault Classes and Error Detection
Capability of Specification Based Testing," ACM
Transactions on Software Engineering and Methodology,Vol.
8, No. 4 (October,1999) - demonstrates existence of a hierarchy of
fault classes that may be used to generate test more efficiently.
Others have extended the hierarchy based on more types of faults.
- D. Ferraiolo and D.R. Kuhn, "Role Based Access
Controls,'' PDF
HTML
Postscript Proceedings, 15th Natl. Computer
Security
Conference, 1992, pp. 554–563. --- the early
paper on role based access control; includes basic formal definition. This was unified w/ Sandhu et. al (1996) to create the standard model for RBAC.
Professional Activities:
- Senior member of the
Institute of Electrical and Electronics Engineers (IEEE) and
IEEE Computer Society;
member, Association
for Computing Machinery (ACM). - Editorial board member and co-editor, Emerging Technologies
& Standards Dept, IEEE Security & Privacy
- Editorial board member, IEEE IT Professional; co-editor,
Insecure IT column
- Excellence in
Technology Transfer Award, 2009, Federal Laboratory
Consortium Mid-Atlantic Region.
- Best Standards Contribution, NIST/ITL, 2008
- Best Journal Paper Award, NIST/ITL, 2007
- Outstanding
Authorship Award, NIST/ITL, 2003
- Gold medal
award for scientific/engineering achievement, U.S. Dept. of Commerce,
2002;
- Excellence in
Technology Transfer Award,1998,
Federal Laboratory Consortium.
- Bronze Medal, U.S. Dept. of Commerce, 1990;
- Member, Beta Gamma Sigma honorary.
- Patents: Implementation of Role Based Access Control in
Multi-level Secure
Systems. U.S. Patent #6,023,765.,
- Past member of DARPA
High Confidence Systems Working Group, IEEE Technical
Committee on Operating Systems
POSIX 1003.1, 1003.2 and 1201.2 working groups; and
President's National Security Telecommunications Advisory Committee/
Network Security Information Exchange
- Past projects:
development of software tools and conformance test suites;
methods for analyzing changes in formal specifications;
verification of cryptographic protocols; and the first formal
definition of role based access control; IEEE POSIX working groups and
developing parts of the POSIX Conformance Test Suite for IEEE 1003.1;
and definition of software assurance requirements for FIPS
140-1
(Security Requirements for Cryptographic Modules).
Combinatorial Methods and Software Assurance
- D.R. Kuhn, R.N. Kacker Measuring Combinatorial Coverage of System State-space for IV&V (extended abstract) NASA IV&V Workshop, Sept 11-13, 2012.
- D.R. Kuhn, R.N. Kacker, Y. Lei. “Combinatorial Testing”. Encyclopedia of Software Engineering, CRC Press, 2012.
- D.R. Kuhn, J.M. Higdon, J.F. Lawrence, R.N. Kacker, Y. Lei, “Efficient Methods for Interoperability Testing Using Event Sequences”, CrossTalk, The Journal of Defense Software Engineering - July/Aug 2012.
- C. Montanez, D.R. Kuhn, M. Brady, R. Rivello, J. Reyes, M.K. Powers, “Evaluation of Fault Detection Effectiveness for Combinatorial and Exhaustive Selection of Discretized Test Inputs”, Software Quality Professional - June, 2012.
- MN Borazjany, L Yu, Y Lei, R. Kacker and D.R. Kuhn. Combinatorial Testing of ACTS: A Case Study FIrst Intl Workshop on Combinatorial Testing, April, 2012.
- K Shakya, T Xie, N Li, Y Lei, R Kracker and D.R. Kuhn. Isolating Failure-Inducing Combinations in Combinatorial Testing using Test Augmentation and Classification, FIrst Intl Workshop on Combinatorial Testing, April, 2012.
- D.R. Kuhn, J. Higdon, J. Lawrence, R.N. Kacker and Y. Lei, Combinatorial Methods for Event Sequence Testing, FIrst Intl Workshop on Combinatorial Testing, April, 2012.
- V.C. Hu, D.R. Kuhn, T. Xie, J. Hwang, "Model Checking for Verification of Mandatory Access Control Models and Properties",
Intl. J. of Software Eng. and Knowledge Eng., vol. 21, no. 1, 2011, pp.
103-127. - demonstrates use of combinatorial methods for testing access
control rules.
- C. Montanez, D.R. Kuhn, M. Brady, R. Rivello, J. Reyes, M.K. Powers, "An Application of
Combinatorial Methods to Conformance Testing for Document Object Model Events NIST -IR 7773, 25 Jan 2011
- R.C. Bryce, C.J. Colbourn, D.R. Kuhn, "Finding Interaction Faults Adaptively using Distance-Based Strategies", 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011, to appear.
- J.R. Maximoff, M.D. Trela, D.R. Kuhn, R. Kacker, "A Method for Analyzing System State-space Coverage within a t-Wise Testing Framework", IEEE International Systems Conference 2010, Apr. 4-11, 2010, San Diego. - describes several measurements that aid in
understanding combinatorial coverage of test suites constructed with a
variety of methodologies.
- D.R. Kuhn, R. Kacker, Y.Lei, "Random
vs. Combinatorial
Methods for Discrete Event Simulation of a Grid Computer
Network", Proceedings, Mod Sim World 2009, Oct.
14-17 2009,
Virginia Beach, pp. 83-88, NASA CP-2010-216205, National Aeronautics and Space Administration.
- D.R. Kuhn,R. Kacker, Y. Lei, "Combinatorial
and Random Testing Effectiveness for a Grid Computer Simulator"
NIST Tech. Rpt. 24 Oct 2008.
- R. Kuhn, R. Kacker, Y. Lei, J. Hunter, "Combinatorial
Software Testing", IEEE Computer, vol. 42, no. 8
(August 2009).
- V. Hu, D.R. Kuhn, T. Xie, J. Hwang, "Model Checking for
Verification of Mandatory Access Control Models and Properties", Intl.
J. of Software Engineering and Knowledge Engineering, (to appear).
- D.R. Kuhn, Y.Lei, R. Kacker, "Practical
Combinatorial
Testing - Beyond Pairwise", IEEE IT Professional, June 2008.
An overview and introduction to combinatorial
testing.
- D.R. Kuhn, R. Kacker, Y. Lei, "Automated
Combinatorial Test Methods", Crosstalk, Journal of Defense Software Engineering, June 2008
- a tutorial on integrating combinatorial testing with model checking to automated test case generation.
- M. Forbes, J. Lawrence,
Y. Lei, R.N. Kacker, and D.R. Kuhn "Refining
the In-Parameter-Order Strategy for Constructing Covering Arrays",
NIST Journal of Research, Vol. 113, No. 5 (Sept/Oct 2008), pp. 287-297.
- Y.Lei, R. Kacker, D.R. Kuhn,
V. Okun, J. Lawrence., "IPOG - a General Strategy for t-way
Testing," IEEE Engineering of Computer Based Systems
Conference,
2007.
- Y. Lei, R.
Kacker, D. Kuhn, V. Okun, J. Lawrence, ``IPOG/IPOD:
Efficient Test
Generation for Multi-Way Software Testing," accepted for
publication in
Journal of Software Testing, Verification, and Reliability, vol. 18,
pp. 125-148, DOI: 10.1002/stvr.381)
- D.R. Kuhn, D.R. Wallace, A.J. Gallo, Jr., "Software
Fault Interactions and Implications for Software Testing",
IEEE Trans. on Software Engineering, vol. 30, no. 6, June, 2004) -
investigates interaction level required to trigger failures in a large
distributed database system.
- D. R. Kuhn, V. Okun, "Pseudo-exhaustive Testing For Software",
30th NASA/IEEE Software Engineering Workshop, April 25-27, 2006.
Describes a proof of concept study of generating
combinatorial
tests (through 6-way) using model checking.
- D.R. Wallace, D.R. Kuhn, "Failure
Modes in Medical Device Software: an Analysis of 15 Years of Recall Data
," International Journal of Reliability, Quality, and Safety
Engineering,
Vol. 8, No. 4, 2001 - categorizes the failures by their symptoms and
faults, and discusses methods of preventing and detecting faults in
each category.
- D.R. Kuhn, D.R. Wallace, A.J. Gallo, Jr., "Software
Fault Interactions and Implications for Software Testing" (pdf),
IEEE Trans. on Software Engineering,
vol. 30, no. 6, June, 2004). Empirical study of failures in
a
variety of domains showing that all failures found were triggered by 2-
through 6-way interactions.
- D.R. Kuhn, D. Craigen, M. Saaltink, "Practical
Application of Formal Methods in Modeling and Simulation" (pdf)
(invited), Summer Simulation Conference, 03, July
20 - 24, 2003.
- D.R. Kuhn, M.J. Reilly, "An
Investigation of the Applicability of Design of Experiments to Software
Testing" (pdf),
27th NASA/IEEE Software Engineering Workshop, NASA Goddard Space Flight
Center, 4-6 December, 2002. Looks at suitability of
combinatorial
testing for browser and server applications.
- D.R. Kuhn, R. Chandramouli, R.W. Butler, "Cost
Effective Uses of Formal Methods in V&V" (pdf),
(invited) Foundations '02 Workshop, US Dept of
Defense, Laurel MD, October 22-23, 2002.
- D.R. Kuhn, "Fault Classes and Error Detection
Capability of Specification Based Testing," ACM
Transactions on Software Engineering and Methodology,
Vol. 8, No. 4 (October,1999) - demonstrates existence of a hierarchy of
fault classes that may be used to generate test more efficiently.
- D.R. Kuhn, "Sources of Failure in the Public Switched
Telephone Network," (HTML),
( PDF) IEEE Computer
Vol. 30, No. 4 (April, 1997). --- examines causes of failure in the US
public switched telephone network, providing quantitative measures of
the effect of each failure source on system dependability.
- D.R. Kuhn, "Evolving Directions in Formal Methods"
(pdf), (invited) Proceedings, COMPASS '97 IEEE
Computer Society Press, 1997
- D.R. Kuhn, "A
Technique for Analyzing the Effects of Changes in Formal
Specifications,'' (postscript) British Computer
Society Computer Journal, Vol.
35, No. 6, (December, 1992). --- a mathematical technique (extends the
boolean difference method) to determine the conditions under which a
change to a variable in a predicate calculus expression will change the
value of the expression; includes theorem on relationship between
boolean difference and predicate difference.
- D.R. Kuhn, "Predicate Differences and the Analysis of
Dependencies in Formal Specifications,'' Proceedings, 14th
Natl. Computer Security Conference, 1991.
--- describes predicate differences, an extension of boolean
differences, and shows how they can be used in determining dependencies
among parts of a specification, with application to security
- D. R. Kuhn and J.F. Dray, "Formal
Specification and Verification of Control Software for Cryptographic
Equipment,'' (postscript) Proceedings, Annual
Computer Security Applications Conference, IEEE Computer
Society Press, 1990. --- design verification of software and
cryptographic protocol in a smart-card system.
- D. R. Kuhn, "On the Effective Use of Software Standards
in Systems Integration'', (pdf) Proceedings, First
Intl. Conference on Systems Integration, IEEE
Computer Society Press, 1990. --- explains open system standards and
how they can be effectively applied to the problem of systems
integration.
- D.R. Kuhn, "Generating Extended State Transitions
from Structured Specifications for Process Control Systems,'' IEE/BCS
Software Engineering Journal, Vol.
4, No. 5 ( September, 1989.) --- describes a translation tool
that converts specifications written in an imperative
language to
a state machine representation for use with robotic control
system.
- D.R. Kuhn, "Static Analysis Tools for Software Security
Certification," Proceedings, 11th National Computer Security
Conference, NSA/NBS, 1988.
Quantum Cryptography
- D.R. Kuhn, "A Quantum Cryptographic Protocol with
Detection of Compromised Server", Journal of Quantum
Information and Computing, vol. 5, no. 7, 2005.(revised and extended
quant-ph/0311085)
- D.R. Kuhn, "A Quantum Cryptographic Protocol with Detection
of Compromised Server", quant-ph/0311085, Nov. 14, 2003.
- D.R. Kuhn, "Vulnerabilities in Quantum Key Distribution
Protocols" - cryptanalysis of some recently
proposed quantum cryptographic protocols. quant-ph/0305076, May 14, 2003.
- D.R. Kuhn, "A Hybrid Authentication Protocol Using
Quantum Entanglement and Symmetric Cryptography (pdf)
" - a hybrid cryptographic protocol, using quantum and
classical
resources, for authentication and authorization in a network. quant-ph/0301150, January 28, 2003.
- P.E. Black, D.R. Kuhn, C.J. Williams, "Quantum Computing
and Communication", Advances in Computers, Vol.
56, 2002 (postscript) (Word)
- an introduction to applications of quantum mechanics in computing,
cryptography, and communications.
Security and Role Based Access Control
- R. Kuhn, "Cybersecurity", (guest editor intro),
IEEE IT Professional, vol. 11, no. 4 (July/Aug 2010), pp. 18-19.
- D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Role Based Access Control", IEEE Computer, June, 2010, pp. 79-81.
- R. Kuhn, C. Johnson "Vulnerability Trends: Measuring Progress",
IEEE IT Professional, vol. 11, no. 4 (July/Aug 2010), pp. 51-53.
- S. Liu, R. Kuhn, "Data Loss Prevention",
IEEE IT Professional, vol. 11, no. 2 (Mar/Apr 2010), pp. 10-13.
- D.R. Kuhn, S. Liu,H. Rossman, "Practical Interdomain Routing Security",
IEEE IT Professional, vol. 11, no. 6 (Nov/Dec 2009), pp. 54-56.
- S. Liu, D.R. Kuhn, H. Rossman, "Understanding
Insecure IT: Practical Risk Assessment",
IEEE IT Professional, vol. 11, no. 3 (May/Jun 2009), pp.
49-51.
- S. Liu, D.R. Kuhn, H. Rossman, "Surviving
Insecure IT: Effective Patch Management",
IEEE IT Professional, vol. 11, no. 2 (Mar/Apr 2009), pp.
49-51.
- D.R. Kuhn, H. Rossman, S. Liu, "Introducing
Insecure IT",
IEEE IT Professional, vol. 11, no. 1 (Jan/Feb 2009), pp. 24-26. -
introductory column for the "Insecure IT" department in IT
Pro.
- V. Hu, D.R. Kuhn, T. Xie, "Property
Verification for Generic Access Control Models", IEEE/IFIP
International Symposium
on Trust, Security, and Privacy for Pervasive Applications, Shanghai,
China, Dec. 17-20, 2008. - a method of using combinatorial testing with
model checking to verify access control properties.
- D.F. Ferraiolo, R. Kuhn, R. Sandhu, "RBAC
Standard
Rationale: comments on “A Critique of the ANSI
Standard on Role Based Access Control'”, IEEE
Security & Privacy, vol. 5, no. 6 (Nov/Dec 2007).`
- D.R. Kuhn. , “Feature
Interactions and Data Privacy,” Workshop on Data
Confidentiality, Sept
6-7, 2007, Arlington, VA.
- V. Hu, D.R. Kuhn, D.F. Ferraiolo, “The
Computational Complexity of Enforceability Validation for Generic
Access Control Rules”, IEEE International
Conference on
Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006)
- K. Sriram, D. Montgomery, O. Kim, O. Borchert, D. R. Kuhn, "Autonomous
System Isolation under BGP Session Attacks with RFD Exploitation",
IEEE JSAC special issue on High-Speed Network Security. 2006
- D.F. Ferraiolo, S. Gavrila, V. Hu, D.R. Kuhn, "Composing
and Combining Policies Under the Policy Machine", Proc.
SACMAT 2005, ACM.
- D. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn,R.
Chandramouli, " A Proposed Standard for Role Based Access
Control ," ACM Transactions on Information and
System Security , vol. 4, no. 3 (August, 2001) - draft of a
consensus standard for RBAC.
- D.F. Ferraiolo, J.F. Barkley, D.R. Kuhn, "A Role Based Access Control Model and
Reference Implementation within a Corporate Intranet," (postscript)
ACM Transactions on Information and Systems Security, Vol.2,
No. 1 (February, 1999). -- defines the NIST RBAC model, details
theoretical results, and describes implementation concerns.
- D.R. Kuhn, "Mutual
Exclusion of Roles as a Means of Implementing Separation of Duty in
Role Based Access Control Systems," (postscript) Second
ACM Workshop on Role Based Access Control,
1997. -- presents a number of results on separation of duty through
mutual exclusion of roles, including theorems on necessary and
sufficient conditions to ensure separation safety.
- T. Phillips, T. Karygiannis, R. Kuhn, "Security
Standards for the RFID Market", IEEE Security
& Privacy, vol. 3, no. 6, Nov/Dec, 2005.
- T.J. Walsh, D.R. Kuhn, "Challenges
in Securing Voice Over IP", IEEE Security & Privacy,
vol. 3, no. 3, May/June, 2005.
- R. Sandhu, D. Ferraiolo, R. Kuhn, "The NIST Model
for Role Based Access Control: Towards a Unified
Standard," (postscript)
(pdf
) Proceedings, 5th ACM Workshop on Role
Based Access Control, July 26-27, 2000 - first public draft
of proposal for an RBAC standard.
- D.R. Kuhn, C. Dabrowski, T. Rhodes, "Software Standards,"
(invited) Encyclopedia of Electrical and
Electronics Engineering, John Wiley &
Sons, 1999. -- describes software standards and how to use them
effectively in systems development.
- S.A. Wakid, D.R. Kuhn, D.R. Wallace, "Toward
Credible IT Testing and Certification "(pdf)
IEEE Software,
Vol. 16, No. 4 (July, 1999) -- discusses cost-effective processes for
software testing and certification by government and other
certification organizations.
- D.R. Kuhn, "Role Based Access Control on MLS Systems
Without Kernel Changes," (postscript) (pdf
) Third ACM Workshop on Role Based Access Control,
October 22-23,1998. -- a novel combinatorial algorithm mapping
hierarchical role structures to categories on MLS systems implementing
mandatory access control, making it possible to implement RBAC
structures without modifying OS kernel.
- J.F. Barkley, D.R. Kuhn, L.S. Rosenthal, M.W. Skall, A.V.
Cincotta, "Role Based Access Control for the Web," (HTML)
CALS Expo International and 21st Century Commerce 1998: Global Business
Solutions for the New Millenium. HTML
- J.F. Barkley, A. Cincotta, D.F. Ferraiolo, S. Gavrilla, and
D.R. Kuhn "Role Based Access Control for the World
Wide Web" (postscript), National Information
Systems Security Conference, October, 1997.
- D.F. Ferraiolo and D.R. Kuhn, "Future Directions in Role
Based Access Control," (invited) Proceedings, First ACM
Workshop on Role Based Access Control, ACM, 1996. --
discusses new roles for RBAC (pun intended)
- D. Ferraiolo, J. Cugini, R. Kuhn, "Role Based Access Control: Features and
Motivations," (HTML) Proceedings, Annual Computer
Security Applications Conference, IEEE
Computer Society Press, 1995. -- elaborates the 1992 RBAC model to a
level of detail suitable for building directly into an application
- D.R. Wallace, D.R. Kuhn, L.M. Ippolito, and L. Beltracchi,
"Standards for High Integrity Software ,'' Nuclear Safety, Vol.
35, No. 1, (Jan - June, 1994). --- compares assurance methods required
by various standards for safety critical systems and secure systems.
- D.R.
Kuhn, P.N. Edfors, V. Howard, C. Caputo, T. Phillips, ``Improving
Public Switched Network Security in an Open Environment,'' (invited) IEEE
Computer, Vol.
26, No. 8 (August, 1993.) --- describes some government efforts to
improve the security of the US public switched telephone network.
- D. Ferraiolo and D.R. Kuhn, "Role Based Access
Controls,'' PDF
HTML
Postscript Proceedings, 15th Natl. Computer
Security
Conference, 1992, pp. 554–563. --- the early
paper on role based access
control; includes basic formal definition.
- D.R. Kuhn, "IEEE's POSIX "(pdf), IEEE
Spectrum,
Vol. 28, No. 12 (December, 1991.) --- explains the IEEE POSIX open
system standards and how they can help make a component based software
industry economically feasible.
Books and Book Chapters
- R. Bryce, Y. Lei, D.R. Kuhn, R. Kacker, "Combinatorial
Testing", Chap. 14, Handbook of Research on Software Engineering and
Productivity Technologies: Implications of Globalization, Ramachandran, ed. , IGI Global, 2009.
- D.Ferraiolo, D.R. Kuhn, V. Hu, "Authentication,
Authorization, Access Control, and Privilege Management", Wiley
Handbook of Science and Technology for Homeland Security, 2008.
- D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role
Based Access Control, 2nd edition (book), Artech House, 2007.
- D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role
Based Access Control (book), Artech House, 2003.
- D.R. Kuhn,W.J. Majurski, W. McCoy, F. Schulz, "Open Systems Software Standards in
Concurrent Engineering,'' (postscript) (invited) in Control
and Dynamic Systems - Concurrent Engineering Techniques and
Applications, C.T. Leondes, ed., Academic Press, 1994. ---
discusses open system standards and how they apply to concurrent
engineering.
- D.R. Kuhn, C. Dabrowski, T. Rhodes, "Software Standards" Encyclopedia of Electrical and
Electronics Engineering, John Wiley &
Sons, 1999. -- describes software standards and how to use them
effectively in systems development.
NIST Publications:
Various Presentations:
Automated
Combinatorial Testing
Automated
Combinatorial Testing for Software
Software
Fault Interactions
Quantum
Cryptography Today and Tomorrow:
Or, How to Make and Break Quantum Cryptosystems
Security
for Telecommuting and Broadband Communications
Toward
Credible IT Testing and Certification
Education: