NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 151 to 160 of 229 records.
Resort by: Date / Title


151. Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/24/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905108

152. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-2
Topic: Cybersecurity
Published: 2/19/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: [Superseded by SP 800-78-3 (December 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as wel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962

153. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr, Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904797

154. A Model of Joint Congestion Control and Routing Through Random Assignment of Paths
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7590
Topic: Cybersecurity
Published: 2/16/2010
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We investigate the trade-off between utility and path diversity in a model of congestion control where there can be multiple routes between two locations in a network The model contains a random route allocation scheme for each source s (user or TCP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902537

155. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

156. Practical Interdomain Routing Security
Topic: Cybersecurity
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904041

157. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-126
Topic: Cybersecurity
Published: 11/5/2009
Authors: Stephen D Quinn, David Anthony Waltermire, Christopher S. Johnson, Karen Ann Scarfone, John Franklin Banghart
Abstract: This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates inf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904075

158. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Topic: Cybersecurity
Published: 10/16/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904044

159. Small Business Information Security: the Fundamentals
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7621
Topic: Cybersecurity
Published: 10/1/2009
Author: Richard L Kissel
Abstract: For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading partners it is very important. The term Small Enterprise (or Small Organization) is som ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903080

160. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 1
Topic: Cybersecurity
Published: 9/30/2009
Authors: Stephen D Quinn, Karen Ann Scarfone, Murugiah P Souppaya
Abstract: [Superseded by SP 800-70 Rev. 2 (February 2011): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732] A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. C ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901337



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series