NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 91 to 100 of 124 records.
Resort by: Date / Title

91. Computer Security Division 2009 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7653
Topic: Cybersecurity
Published: 3/23/2010
Author: Patrick D O\'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publication ...

92. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 2/22/2010
Authors: Ronald S Ross, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010, w/updates through 6/5/2014):] The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to fe ...

93. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr., Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: [Superseded by SP 800-73-4 (May 2015):] FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities inclu ...

94. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: [Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015):] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides genera ...

95. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-126
Topic: Cybersecurity
Published: 11/5/2009
Authors: Stephen D Quinn, David Anthony Waltermire, Christopher S. Johnson, Karen Ann Scarfone, John Franklin Banghart
Abstract: This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates inf ...

96. Guidelines on Firewalls and Firewall Policy
Series: Special Publication (NIST SP)
Report Number: 800-41 Rev 1
Topic: Cybersecurity
Published: 9/28/2009
Authors: Karen Ann Scarfone, Paul Hoffman
Abstract: Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security c ...

97. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B
Topic: Cybersecurity
Published: 8/28/2009
Authors: Elaine B Barker, Lidong Chen, Andrew Richard Regenscheid, Miles E. Smid
Abstract: [Superseded by SP 800-56B Rev. 1 (September 2014):] This recommendation specifies key establishment schemes using integer factorization cryptography, based on ANS X9 44, Key Establis ...

98. Guide to Enterprise Telework and Remote Access Security
Series: Special Publication (NIST SP)
Report Number: 800-46 Rev 1
Topic: Cybersecurity
Published: 6/16/2009
Authors: Karen Ann Scarfone, Paul Hoffman, Murugiah P Souppaya
Abstract: Many organizations employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an organization s non-public computing resources. The nature ...

99. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...

100. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series