NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 91 to 100 of 221 records.
Resort by: Date / Title

91. Guide for Security-Focused Configuration Management of Information Systems
Series: Special Publication (NIST SP)
Report Number: 800-128
Topic: Cybersecurity
Published: 8/12/2011
Authors: L Arnold Johnson, Kelley L Dempsey, Ronald S Ross, Sarbari Gupta, Dennis Bailey
Abstract: The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ...

92. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7788
Topic: Cybersecurity
Published: 8/1/2011
Authors: Anoop Singhal, Xinming Ou
Abstract: Today's information systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of an enterprise network cannot be determined by simply counting the number of vulnerabi ...

93. O2 A-band line parameters to support atmospheric remote sensing. Part II: The rare isotopologues
Topic: Cybersecurity
Published: 7/21/2011
Authors: Joseph Terence Hodges, David A Long, Daniel K Havey, S. S. Yu, M Okumura, Charles E Miller
Abstract: Frequency-stabilized cavity ring-down spectroscopy (FS-CRDS) was employed to measure over 100 transitions in the R-branch of the b1Σg+←X3Σg-(0,0) band for the rare O2 isotopologues. The use of 17O- and 18O-enriched mixtures allowed fo ...

94. Cloud Service Feature Driven Security Policies for Virtualized Infrastructures
Topic: Cybersecurity
Published: 7/19/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profi ...

95. On the Security of Hash Functions Employing Blockcipher Postprocessing
Topic: Cybersecurity
Published: 7/14/2011
Authors: Dong H. Chang, Mridul Nandi, Moti Yung
Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P ...

96. Guidelines for Protecting Basic Input/Output System (BIOS) Firmware
Series: ITL Bulletin
Topic: Cybersecurity
Published: 6/28/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Pol ...

97. Specification for the Asset Reporting Format 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7694
Topic: Cybersecurity
Published: 6/21/2011
Authors: David Anthony Waltermire, Adam Halbardier, Mark Johnson
Abstract: This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, corre ...

98. Specification for Asset Identification 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7693
Topic: Cybersecurity
Published: 6/17/2011
Authors: David Anthony Waltermire, John Wunder, Adam Halbardier
Abstract: Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifie ...

99. Cybersecurity, Innovation and the Internet Economy
Topic: Cybersecurity
Published: 6/8/2011
Author: Ari M Schwartz
Abstract: The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical ...

100. Identity Management and Privacy: A Rare Opportunity To Get It Right
Topic: Cybersecurity
Published: 6/1/2011
Author: Ari M Schwartz
Abstract: Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series