NIST logo

Publications Portal

You searched on: Author: david cooper Sorted by: title

Displaying records 1 to 10 of 16 records.
Resort by: Date / Title

1. A Closer Look at Revocation and Key Compromise in Public Key Infrastructures
Published: 10/1/1998
Author: David A Cooper
Abstract: Over time, in order to improve functionality or efficiency, new features have been added to the basic framework of public key infrastructures (PKIs). While these new features are useful, as with any other security critical application, new features ...

2. A Model of Cerificate Revocation
Published: 12/1/1999
Author: David A Cooper
Abstract: This paper presents a model for the distribution of revocation information using certificate revocation lists (CRLs). This model is used to highlight inefficiencies in the traditional method of distribution certificate status information using CRLs. ...

3. A More Efficient Use of Delta-CRLs
Published: 5/1/2000
Author: David A Cooper
Abstract: Delta-Certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some environments, if delta-CRLs are used as was originally intended, the ben ...

4. A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
Series: Special Publication (NIST SP)
Report Number: 800-116
Published: 11/20/2008
Authors: William I. MacGregor, Ketan L Mehta, David A Cooper, Karen Ann Scarfone
Abstract: This document provides best practice guidelines for integrating the PIV Card with the physical access control systems (PACS) that authenticate the cardholders in Federal facilities. Specifically, this document recommends a risk-based approach for sel ...

5. BIOS Protection Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-147
Published: 4/29/2011
Authors: David A Cooper, William T Polk, Andrew Richard Regenscheid, Murugiah P Souppaya
Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus ...

6. Comparison between NIST and AF laser energy standards using high power lasers
Series: Journal of Research (NIST JRES)
Published: 11/1/2007
Authors: Xiaoyu X. Li, Thomas Scott, Christopher L Cromer, David Cooper, Steven Comisford
Abstract: We report the results of a high-energy laser calorimeter comparison conducted by the National Institute of Standards and Technology (NIST), Boulder, Colorado and the U.S. Air Force Primary Standard Laboratory (AFPSL), Heath, Ohio. A laser power meter ...

7. Comparison of absolute measurements of laser power using next generation NIST high power radiometer and Air Force high power calorimeter
Published: 6/8/2011
Authors: Marla L Dowell, Christopher L Cromer, Xiaoyu X. Li, John Bagford, Dan Seibert, John Eric, David Cooper, Steven Comisford, Ernie Cromwell, Richard Bowling
Abstract: We report comparisons of laser power measurements between the new NIST radiometer, also known as the BB Prime, and the current Air Force standards, known as the BB calorimeter. [1] These measurements were performed using high power laser sources in t ...

8. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-3
Published: 12/31/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr, Hildegard Ferraiolo, David A Cooper
Abstract: This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as well as the supporting infrastructure specified in FIPS 201 and the related Special Publication 800-73, Interfaces f ...

9. Guidelines for Derived Personal Identity Verification (PIV) Credentials
Series: Special Publication (NIST SP)
Report Number: 800-157
Published: 12/19/2014
Authors: Hildegard Ferraiolo, David A Cooper, Salvatore Francomacaro, Andrew Richard Regenscheid, Mohler Jason, Sarbari Gupta, William Edward Burr
Abstract: This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove c ...

10. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr, Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series