Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 626 - 650 of 1430

Framework for Improving Critical Infrastructure Cybersecurity

February 19, 2014
Author(s)
Kevin M. Stine, Kim Quill, Gregory A. Witte
Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0

February 12, 2014
Author(s)
Adam Sedgewick
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation

Report: Authentication Diary Study

February 4, 2014
Author(s)
Michelle P. Steves, Mary F. Theofanos
Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same password (or

Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit

February 3, 2014
Author(s)
Chung Tong Hu, Karen Scarfone
Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objects

The Importance of Entropy to Information Security

February 3, 2014
Author(s)
Apostol T. Vassilev, Timothy Hall
The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline the

Optimal Spread in Network Consensus Models

January 27, 2014
Author(s)
Fern Y. Hunt
Suppose we seek a set of nodes in a network that will enable the fastest spread of information in a decentralized communication environment. If communication resources are limited there are constraints on the number of nodes that can be selected. In this

IREX IV: Part 2 Compression Profiles for Iris Image Compression

January 23, 2014
Author(s)
George Quinn, Patrick Grother, Mei Ngan, Nick Rymer
The IREX IV evaluation builds upon IREX III as a performance test of one-to-many iris recognition. This report is the second part of the IREX IV evaluation, which specifically, evaluates the ability of automated iris recognition algorithms to match heavily

Building one-time memories from isolated qubits

January 14, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are a simple type of tamper-resistant cryptographic hardware, that can be used to implement many forms of secure computation, such as one-time programs. Here we investigate the possibility of building OTM's using "isolated qubits"

A Profile of the Key Management Framework for the Federal Government

January 9, 2014
Author(s)
Elaine B. Barker
The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Framework for

A New Standard for Securing Media-Independent Handover: IEEE 802.21a

December 31, 2013
Author(s)
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802

The National Vulnerability Database (NVD): Overview

December 18, 2013
Author(s)
Harold Booth, Doug Rike, Gregory A. Witte
The National Vulnerability Database (NVD), and its companion, the National Checklist Program (NCP), have provided a valuable and flexible set of services to users around the world since NVD was established in 2005. The NVD was established to provide a U.S

Avoiding Accidental Data Loss

October 18, 2013
Author(s)
Richard L. Kissel
Does your organization have systematic procedures to remove sensitive data from obsolete equipment, or do you use a somewhat ad hoc process for the cleanup and disposal of old gear? Careless disposal of data storage hardware has led to costly and

Creating Integrated Evidence Graphs for Network Forensics

October 18, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Evidence Graphs model network intrusion evidence and their dependencies, which helps network forensics analyst collate and visualize dependencies. In particular, probabilistic evidence graph provide a way to link probabilities associated with different

Aggregating Vulnerability Metrics in Enterprise Networks using Attack Graphs

September 20, 2013
Author(s)
John Homer, Su Zhang, Xinming Ou, David Schmidt, Yanhui Du, S. Raj Rajagopalan, Anoop Singhal
Quantifying security risk is an important and yet difficult task in enterprise network security man- agement. While metrics exist for individual software vulnerabilities, there is currently no standard way of aggregating such metrics. We present a model
Displaying 626 - 650 of 1430