Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: athanasios karygiannis Sorted by: date

Displaying records 1 to 10 of 17 records.
Resort by: Date / Title

1. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...

2. Vetting the Security of Mobile Applications
Series: Special Publication (NIST SP)
Report Number: 800-163
Published: 1/26/2015
Authors: Stephen Quirolgico, Jeffrey Mark Voas, Athanasios T Karygiannis, Christoph Michael, Karen Scarfone
Abstract: The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the typ ...

3. Building Security into Off-the-Shelf Smartphones
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...

4. Access Control for SAR Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7815
Published: 7/1/2011
Authors: Stephen Quirolgico, Chung Tong Hu, Athanasios T Karygiannis
Abstract: The Access Control for SAR Systems (ACSS) project focused on developing a prototype privilege management system used to express and enforce policies for controlling access to Suspicious Activity Report (SAR) data within the law enforcement domain. Th ...

5. Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce
Published: 8/12/2009
Authors: Athanasios T Karygiannis, Emmanouil Antonakakis
Abstract: Mobile commerce and location-aware services promise to combine the conveniences of both online and offline bricks-and-mortar services. Just as agent-enabled desktop computers can be used to improve a users e-commerce experience, so can agent-enabled ...

6. Guidelines for Securing Radio Frequency Identification (RFID) Systems
Series: Special Publication (NIST SP)
Report Number: 800-98
Published: 4/6/2007
Authors: Athanasios T Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn, T. Phillips
Abstract: This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a m ...

7. Electromagnetic Signatures of Wireless Local Area Network Cards: Implementation Issues and Detection in the Presence of Interferers
Published: 12/21/2005
Authors: K. Remley, Robert Johnk, Athanasios T Karygiannis, Emmanouil Antonakakis
Abstract: This work investigates a measurement method for detecting the radio-frequency electromagnetic characteristics of an individual 802.11b wireless local-area network (WLAN) card--its electromagnetic signature--in the presence of an interfering signal. T ...

8. Security Policy Management for Handheld Devices
Published: 6/1/2003
Authors: Wayne Jansen, Athanasios T Karygiannis, M Iorga, Serban Ilie Gavrila, Vlad Korolev
Abstract: The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new risks to existing enterprise computing resources. Therefore, organizati ...

9. Policy Expression and Enforcement for Handheld Devices
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6981
Published: 4/1/2003
Authors: Wayne Jansen, Athanasios T Karygiannis, Vladimir Korolev, Serban Ilie Gavrila, Michaela Iorga
Abstract: The use of mobile handheld devices, such as Personal Digital Assistants (PDAs) and tablet computers, within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but instead have bec ...

10. Wireless Network Security: 802.11, Bluetooth and Handheld Devices
Series: Special Publication (NIST SP)
Report Number: 800-48
Published: 11/1/2002
Authors: Athanasios T Karygiannis, L Owens
Abstract: [Superseded by SP 800-48 Rev. 1 (July 2008): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890006] The purpose of this document is to provide agencies with guidance for establishing secure wireless networks. Agencies are encouraged to ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series