NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 151 to 160 of 240 records.
Resort by: Date / Title


151. Computer Security Division 2009 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7653
Topic: Cybersecurity
Published: 3/23/2010
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905148

152. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905108

153. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37 Rev 1
Topic: Cybersecurity
Published: 2/22/2010
Authors: Ronald S Ross, L A. Johnson
Abstract: [Superseded by SP 800-37 Rev. 1 (February 2010, w/updates through 6/5/2014): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094] The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to fe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904985

154. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-2
Topic: Cybersecurity
Published: 2/19/2010
Authors: William T Polk, Donna F Dodson, William E. (William E.) Burr
Abstract: [Superseded by SP 800-78-3 (December 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as wel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962

155. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr, Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904797

156. A Model of Joint Congestion Control and Routing Through Random Assignment of Paths
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7590
Topic: Cybersecurity
Published: 2/16/2010
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We investigate the trade-off between utility and path diversity in a model of congestion control where there can be multiple routes between two locations in a network The model contains a random route allocation scheme for each source s (user or TCP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902537

157. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Series: Special Publication (NIST SP)
Report Number: 800-38E
Topic: Cybersecurity
Published: 1/18/2010
Author: Morris J Dworkin
Abstract: This document approves the XTS-AES mode of the AES algorithm by reference to IEEE Std 1619-2007, subject to one additional requirement, as an option for protecting the confidentiality of data on storage devices. The mode does not provide authenticat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904691

158. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William E. (William E.) Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

159. Practical Interdomain Routing Security
Topic: Cybersecurity
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904041

160. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-126
Topic: Cybersecurity
Published: 11/5/2009
Authors: Stephen D Quinn, David Anthony Waltermire, Christopher S. Johnson, Karen Ann Scarfone, John Franklin Banghart
Abstract: This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates inf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904075



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series