NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 101 to 110 of 229 records.
Resort by: Date / Title


101. Cloud Service Feature Driven Security Policies for Virtualized Infrastructures
Topic: Cybersecurity
Published: 7/19/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908387

102. On the Security of Hash Functions Employing Blockcipher Postprocessing
Topic: Cybersecurity
Published: 7/14/2011
Authors: Dong H. Chang, Mridul Nandi, Moti Yung
Abstract: Analyzing desired generic properties of hash functions is an important current area in cryptography. For example, in Eurocrypt 2009, Dodis, Ristenpart and Shrimpton introduced the elegant notion of "Preimage Awareness" (PrA) of a hash function H^P ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907643

103. Guidelines for Protecting Basic Input/Output System (BIOS) Firmware
Series: ITL Bulletin
Topic: Cybersecurity
Published: 6/28/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Pol ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908837

104. Specification for the Asset Reporting Format 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7694
Topic: Cybersecurity
Published: 6/21/2011
Authors: David Anthony Waltermire, Adam Halbardier, Mark Johnson
Abstract: This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, corre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908483

105. Specification for Asset Identification 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7693
Topic: Cybersecurity
Published: 6/17/2011
Authors: David Anthony Waltermire, John Wunder, Adam Halbardier
Abstract: Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908482

106. Cybersecurity, Innovation and the Internet Economy
Topic: Cybersecurity
Published: 6/8/2011
Author: Ari M Schwartz
Abstract: The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908648

107. Identity Management and Privacy: A Rare Opportunity To Get It Right
Topic: Cybersecurity
Published: 6/1/2011
Author: Ari M Schwartz
Abstract: Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907666

108. Computer Security Division 2010 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7751
Topic: Cybersecurity
Published: 5/31/2011
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908416

109. Of Passwords and People: Measuring the Effect of Password-Composition Policies
Topic: Cybersecurity
Published: 5/11/2011
Authors: Serge M. (Serge) Egelman, Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
Abstract: Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to guess, system administrators adopt password-composition policies (e.g., ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907615

110. Encryption Basics
Topic: Cybersecurity
Published: 5/2/2011
Authors: Kevin Mcguire Stine, Quynh H Dang
Abstract: Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908084



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series