NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 1 to 10 of 122 records.
Resort by: Date / Title


1. Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI)
Series: Special Publication (NIST SP)
Report Number: 800-79-2
Topic: Cybersecurity
Published: 7/30/2015
Authors: Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Scott Shorter
Abstract: The purpose of this Special Publication is to provide appropriate and useful guidelines for assessing the reliability of issuers of Personal Identity Verification (PIV) Cards and Derived PIV Credentials. These issuers store personal information and i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918845

2. Improved Security and Mobility Through Updated Interfaces for PIV Cards
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/21/2015
Authors: Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919014

3. Guide to Industrial Control Systems (ICS) Security
Series: Special Publication (NIST SP)
Report Number: 800-82 Rev 2
Topic: Cybersecurity
Published: 6/3/2015
Authors: Keith A Stouffer, Victoria Y Pillitteri, Suzanne Lightman, Marshall Abrams, Adam Hahn
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918368

4. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-4
Topic: Cybersecurity
Published: 5/29/2015
Authors: David A Cooper, Hildegard Ferraiolo, Ketan L Mehta, Salvatore Francomacaro, Ramaswamy Chandramouli, Jason Mohler
Abstract: FIPS 201 defines the requirements and characteristics of a government-wide interoperable identity credential. FIPS 201 also specifies that this identity credential must be stored on a smart card. This document, SP 800-73, contains the technical speci ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918402

5. Authentication Considerations for Public Safety Mobile Networks
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/14/2015
Authors: Nelson E Hastings, Joshua M Franklin, Larry Feldman, Gregory A. Witte
Abstract: This bulletin summarizes the information presented in NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks, written by Nelson Hastings and Joshua Franklin. The publication analyzes approaches to identity management fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918643

6. On the Unification of Access Control and Data Services
Topic: Cybersecurity
Published: 4/10/2015
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: A primary objective of enterprise computing (via a data center, cloud, etc.) is the controlled delivery of data services (DS). Typical DSs include applications such as email, workflow, and records management, as well as system level features, such as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916565

7. Considerations for Identity Management in Public Safety Networks
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8014
Topic: Cybersecurity
Published: 3/30/2015
Authors: Nelson E Hastings, Joshua M Franklin
Abstract: This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their appli ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917650

8. Guidance for Secure Authorization of Mobile Applications in the Corporate Environment
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/19/2015
Authors: Athanasios T Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
Abstract: This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=918252

9. SATE V Workshop - CVE-selected Analysis Results
Topic: Cybersecurity
Published: 3/14/2015
Author: Bertrand Clement Stivalet
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915835

10. Fuzz Testing for Software Assurance
Topic: Cybersecurity
Published: 3/1/2015
Authors: Vadim Okun, Elizabeth Nee nee Fong
Abstract: Fuzz Testing, or fuzzing, is a software testing technique that involves providing invalid, unexpected, or random test inputs to the software system under test. The system is then monitored for crashes and other undesirable behavior. Fuzz testing can ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917432



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series