Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1051 - 1075 of 1431

Role-Based Access Control, Second Edition

December 31, 2006
Author(s)
David F. Ferraiolo, David R. Kuhn, Ramaswamy Chandramouli
[ISBN-13: 978-1-59693-113-8] This newly revised edition of "Role-Based Access Control" offers the latest details on a security model aimed at reducing the cost and complexity of security administration for large networked applications. The second edition

PIV Card to Reader Interoperability Guidelines

December 29, 2006
Author(s)
James F. Dray Jr., April Giles, Michael Kelley, Ramaswamy Chandramouli
The purpose of this document is to present recommendations for Personal Identity Verification (PIV) card readers in the area of performance and communications characteristics to foster interoperability. This document is not intended to re-state or

Information Security Handbook: A Guide for Managers

December 1, 2006
Author(s)
Pauline Bowen, Joan Hash, Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for

Recommendation for Obtaining Assurances for Digital Signature Applications

November 30, 2006
Author(s)
Elaine B. Barker
Entities participating in the generation or verification of digital signatures depend on the authenticity of the process. This Recommendation specifies methods for obtaining the assurances necessary for valid digital signatures: assurance of domain

Guide to Securing Computers Using Windows XP Home Edition

November 22, 2006
Author(s)
Shirley M. Radack
This bulletin summarizes the information provided in NIST SP 800-69 concerning the need to secure Windows XP Home Edition computers, and discusses the security protections that are available to reduce weaknesses, protect privacy, stop attacks and preserve

RFID Security: A Taxonomy of Risk

October 27, 2006
Author(s)
A Karygiannis, T. Phillips, A. Tsibertzopoulos
Radio Frequency Indentification (RFID) and other automated identification technologies (AIT) are being used by government and industry to replace barcodes and existing pen and paper processes in areas such as asset tracking, toll collection, supply chain

An Ontology of Identity Credentials Part 1: Background and Formulation

October 6, 2006
Author(s)
William I. MacGregor
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation s measurement and standards infrastructure. ITL develops

Programmable Active Services for SIP

October 1, 2006
Author(s)
Jean Deruelle, Mudumbai Ranganathan, Douglas C. Montgomery
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Study of BGP Peering Session Attacks and Their Impacts on Routing Performance

October 1, 2006
Author(s)
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic

Assessment of Access Control Systems

September 29, 2006
Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password

Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities

September 21, 2006
Author(s)
Timothy Grance, Tamara Nolan, Kristin Burke, Rich Dudley, Gregory White, Travis Good
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Guide to Computer Security Log Management

September 13, 2006
Author(s)
Karen A. Scarfone, Murugiah Souppaya
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Guide to Integrating Forensic Techniques into Incident Response

September 1, 2006
Author(s)
Timothy Grance, Suzanne Chevalier, Karen A. Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics. The

Guidelines for Media Sanitization

September 1, 2006
Author(s)
Richard L. Kissel, Matthew A. Scholl, Steven Skolochenko, Xiang Li
Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may require

Personal Identity Verification Demonstration Summary

August 31, 2006
Author(s)
Erika McCallister, Hildegard Ferraiolo
This paper provides a summary of the NIST Personal Identity Verification (PIV) Demonstration. The PIV Demonstration took place from May 15 to June 14, 2006. Forty-four companies voluntarily participated through a Cooperative Research and Development

Concrete Multiplicative Complexity of Symmetric Functions

August 1, 2006
Author(s)
Joan Boyar, Rene Peralta
The multiplicative complexity of a Boolean function f is defined as the minimum number of binary conjunction (AND) gates required to construct a circuit representing f, when only exclusive-or, conjunction and negation gates may be used. This article

5th Annual PKI R&D Workshop "Making PKI Easy to Use" Proceedings

July 18, 2006
Author(s)
William T. Polk, Nelson E. Hastings, Kent Seamons
NIST hosted the fifth annual Public Key Infrastructure (PKI) Research Workshop on April 4-6, 2006. The two and a half day event brought together PKI experts from academia, industry, and government to explore the remaining challenges in deploying public key
Displaying 1051 - 1075 of 1431