Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: david cooper Sorted by: title

Displaying records 1 to 10 of 23 records.
Resort by: Date / Title

1. A Closer Look at Revocation and Key Compromise in Public Key Infrastructures
Published: 10/1/1998
Author: David A Cooper
Abstract: Over time, in order to improve functionality or efficiency, new features have been added to the basic framework of public key infrastructures (PKIs). While these new features are useful, as with any other security critical application, new features ...

2. A Model of Cerificate Revocation
Published: 12/1/1999
Author: David A Cooper
Abstract: This paper presents a model for the distribution of revocation information using certificate revocation lists (CRLs). This model is used to highlight inefficiencies in the traditional method of distribution certificate status information using CRLs. ...

3. A More Efficient Use of Delta-CRLs
Published: 5/1/2000
Author: David A Cooper
Abstract: Delta-Certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some environments, if delta-CRLs are used as was originally intended, the ben ...

4. A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
Series: Special Publication (NIST SP)
Report Number: 800-116
Published: 11/20/2008
Authors: William I. MacGregor, Ketan L Mehta, David A Cooper, Karen Ann Scarfone
Abstract: This document provides best practice guidelines for integrating the PIV Card with the physical access control systems (PACS) that authenticate the cardholders in Federal facilities. Specifically, this document recommends a risk-based approach for sel ...

5. BIOS Protection Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-147
Published: 4/29/2011
Authors: David A Cooper, William T Polk, Andrew Richard Regenscheid, Murugiah P Souppaya
Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus ...

6. Best Practices for Privileged User PIV Authentication
Series: OTHER
Published: 4/21/2016
Authors: Hildegard Ferraiolo, David A Cooper, Andrew Richard Regenscheid, Karen Ann Scarfone, Murugiah P Souppaya
Abstract: The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged u ...

7. Cardholder Authentication for the PIV Digital Signature Key
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7863
Published: 6/18/2015
Authors: William T Polk, Hildegard Ferraiolo, David A Cooper
Abstract: FIPS 201-2 requires explicit user action by the Personal Identity Verification (PIV) cardholder as a condition for use of the digital signature key stored on the card. This document clarifies the requirement for explicit user action to encourage the ...

8. Comparison between NIST and AF laser energy standards using high power lasers
Series: Journal of Research (NIST JRES)
Published: 11/1/2007
Authors: Xiaoyu X. Li, Thomas Scott, Christopher L. Cromer, David Cooper, Steven Comisford
Abstract: We report the results of a high-energy laser calorimeter comparison conducted by the National Institute of Standards and Technology (NIST), Boulder, Colorado and the U.S. Air Force Primary Standard Laboratory (AFPSL), Heath, Ohio. A laser power meter ...

9. Comparison of absolute measurements of laser power using next generation NIST high power radiometer and Air Force high power calorimeter
Published: 6/8/2011
Authors: Marla L Dowell, Christopher L. Cromer, Xiaoyu X. Li, John Bagford, Dan Seibert, John Eric, David Cooper, Steven Comisford, Ernie Cromwell, Richard Bowling
Abstract: We report comparisons of laser power measurements between the new NIST radiometer, also known as the BB Prime, and the current Air Force standards, known as the BB calorimeter. [1] These measurements were performed using high power laser sources in t ...

10. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: [Superseded by SP 800-78-4 (May 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918499] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series