Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 11 to 20 of 731 records.
Resort by: Date / Title

11. A Rational Foundation for Software Metrology
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8101
Topic: Information Technology
Published: 1/20/2016
Authors: David W Flater, Paul E Black, Elizabeth Nee nee Fong, Raghu N Kacker, Vadim Okun, Stephen S Wood, David R Kuhn
Abstract: Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical ...

12. A metamodel for optimization problems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8096
Topic: Information Technology
Published: 1/8/2016
Authors: Ibrahim Assouroko, Peter O Denno
Abstract: In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima) of a given objective that is modeled mathematically. This paper introduces the concept o ...

13. Third-Party Software's Trust Quagmire
Topic: Information Technology
Published: 12/18/2015
Authors: Jeffrey Mark Voas, George Hurlburt
Abstract: Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software' ...

14. Towards a Systematic Threat Modeling Approach for Cyber-physical Systems
Topic: Information Technology
Published: 12/16/2015
Authors: Goncalo Martins, Sajal Bhatia, Xenofon Koutsoukos, Keith A Stouffer, CheeYee Tang, Richard Candell
Abstract: Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide ra ...

15. National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 3
Topic: Information Technology
Published: 12/10/2015
Authors: Stephen D Quinn, Murugiah P Souppaya, Melanie Cook, Karen Scarfone
Abstract: A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an operational environment, for verifying that the product has been configured properly, and/or for id ...

16. Radiative damping in wave guide based FMR measured via analysis of perpendicular standing spin waves in sputtered Permalloy films
Topic: Information Technology
Published: 11/17/2015
Authors: Thomas J Silva, Justin M Shaw, Hans Toya Nembach, Mathias Weiler, Martin Schoen
Abstract: The damping α of the spinwave resonances in 75 nm, 120 nm, and 200 nm -thick Permalloy films is measured via vector-network- analyzer ferromagnetic-resonance (VNA-FMR). Inductive coupling between the sample and the waveguide leads to an addi ...

17. Cyber-Physical Systems Framework
Topic: Information Technology
Published: 11/2/2015
Author: David A Wollman
Abstract: Two worlds that have operated independently,the digital and physical worlds,are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and ...

18. Inferring the Stealthy Bridges between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks
Topic: Information Technology
Published: 10/30/2015
Authors: Anoop Singhal, Xiaoyan Sun, Jun Dai, Peng Liu
Abstract: Enterprise networks are migrating to the public cloud to acquire computing resources for a number of promising benefits in terms of efficiency, expense, and flexibility. Except some public services, the enterpise network islands in cloud are expected ...

19. The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program
Topic: Information Technology
Published: 10/29/2015
Authors: Bonnie Jean Dorr, Craig Stuart Greenberg, Peter C Fontana, Mark Allan Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L Chang
Abstract: The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish ...

20. Policy Machine: Features, Architecture, and Specification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7987 Rev 1
Topic: Information Technology
Published: 10/27/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to enforce a co ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series