NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 91 to 100 of 220 records.
Resort by: Date / Title


91. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7788
Topic: Cybersecurity
Published: 8/1/2011
Authors: Anoop Singhal, Xinming Ou
Abstract: Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907935

92. O2 A-band line parameters to support atmospheric remote sensing. Part II: The rare isotopologues
Topic: Cybersecurity
Published: 7/21/2011
Authors: Joseph Terence Hodges, David A Long, Daniel K Havey, S. S. Yu, M Okumura, Charles E Miller
Abstract: Frequency-stabilized cavity ring-down spectroscopy (FS-CRDS) was employed to measure over 100 transitions in the R-branch of the b1Σg+←X3Σg-(0,0) band for the rare O2 isotopologues. The use of 17O- and 18O-enriched mixtures allowed fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907932

93. Cloud Service Feature Driven Security Policies for Virtualized Infrastructures
Topic: Cybersecurity
Published: 7/19/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908387

94. On the Security of Hash Functions Employing Blockcipher Postprocessing
Topic: Cybersecurity
Published: 7/14/2011
Authors: Dong H. Chang, Mridul Nandi, Moti Yung
Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907643

95. Guidelines for Protecting Basic Input/Output System (BIOS) Firmware
Series: ITL Bulletin
Topic: Cybersecurity
Published: 6/28/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Pol ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908837

96. Specification for the Asset Reporting Format 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7694
Topic: Cybersecurity
Published: 6/21/2011
Authors: David Anthony Waltermire, Adam Halbardier, Mark Johnson
Abstract: This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, corre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908483

97. Specification for Asset Identification 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7693
Topic: Cybersecurity
Published: 6/17/2011
Authors: David Anthony Waltermire, John Wunder, Adam Halbardier
Abstract: Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908482

98. Cybersecurity, Innovation and the Internet Economy
Topic: Cybersecurity
Published: 6/8/2011
Author: Ari M Schwartz
Abstract: The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908648

99. Identity Management and Privacy: A Rare Opportunity To Get It Right
Topic: Cybersecurity
Published: 6/1/2011
Author: Ari M Schwartz
Abstract: Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907666

100. Computer Security Division 2010 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7751
Topic: Cybersecurity
Published: 5/31/2011
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908416



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series