Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 176 - 197 of 197

Evolving Security

October 2, 2016
Author(s)
Edward Griffor
The topic of system security, and in particular that of cybersecurity differs in a critical way from the other concerns we have about systems. Though concerns like safety and resil- ience do have challenges associated with design, realization, and

Demystifying the Internet of Things

September 26, 2016
Author(s)
Jeffrey M. Voas, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-183, Networks of 'Things'. This publication offers an underlying and foundational science to IoT based on the realization that IoT involves sensing, computing, communication, and actuation.

Networks of 'Things'

July 28, 2016
Author(s)
Jeffrey M. Voas
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, five core primitives belonging to most distributed systems are presented. These primitives apply well to

Demystifiying the Internet of Things

June 27, 2016
Author(s)
Jeffrey M. Voas
This short column introduces the need for a foundational science to the Internet of Things (IoT). It introduces the notion of primitives and elements, and their relationship to trustworthiness.

Guidelines for the Creation of Interoperable Software Identification (SWID) Tags

April 22, 2016
Author(s)
David A. Waltermire, Brant Cheikes, Larry Feldman, Gregory A. Witte
This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As instantiated in the International Organization for Standardization/International Electrotechnical

Validation and Verification of Automated Road Vehicles

April 2, 2016
Author(s)
Edward Griffor, Agaram Venkatesh, Frank Barickman, Felix Felix Fahrenkrog
Ubiquitous, commercial deployment of automated road vehicles is desirable in order to realize their potential benefits such as crash avoidance, congestion mitigation, reduced environment impact, reduced driver stress, and increased driver productivity. A

Learning Internet of Things Security "Hands-on"

February 3, 2016
Author(s)
Constantinos Kolias, Angelos Stavrou, Jeff Voas, Irena Bojanova, D. Richard Kuhn
Our research began from asking whether there is a science behind the Internet of Things (IoT). We started from zero knowledge and no bias. The results of that work determined that indeed there is a science, but it is a science of numerous actors, that when

Novel Cyber Physical System for 3D Imaging of the Small Intestine in Vivo

December 11, 2015
Author(s)
Kamran Sayrafian, Kaveh Pahlavan, Yishuang Geng, David Cave, GUANQUN BAO, LIANG MI, EMMANUEL AGU, ANDREW KARELLAS, VAHID TAROKH
Small intestine is the longest organ in the gastrointestinal tract where much of the digestion and the food absorption take place. Wireless video capsule endoscope (VCE) is the first device taking 2-D pictures from the lesions and the abnormalities in the

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

October 15, 2015
Author(s)
Tatu Ylonen, Paul Turner, Karen Scarfone, Murugiah Souppaya
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management

Guidelines for Smart Grid Cybersecurity

September 25, 2014
Author(s)
Victoria Y. Pillitteri, Tanya L. Brewer
This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related characteristics

NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure

June 2, 2014
Author(s)
Victoria Y. Pillitteri
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive

Guide to Bluetooth Security

June 11, 2012
Author(s)
John Padgette, Lidong Chen, Karen Scarfone
[Superseded by SP 800-121 Rev. 2 (May 2017): http://www.nist.gov/manuscript-publication- search.cfm?pub_id=922974] Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless

The Internet of Things: A Reality Check

June 11, 2012
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.

Guidelines on Security and Privacy in Public Cloud Computing

December 9, 2011
Author(s)
Timothy Grance, Wayne Jansen
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from

Guidelines for Securing Radio Frequency Identification (RFID) Systems

April 6, 2007
Author(s)
Tom T. Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn, T. Phillips
This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a manner
Displaying 176 - 197 of 197