NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 161 to 170 of 221 records.
Resort by: Date / Title


161. Guide to Enterprise Telework and Remote Access Security
Series: Special Publication (NIST SP)
Report Number: 800-46 R 1
Topic: Cybersecurity
Published: 6/16/2009
Authors: Karen Ann Scarfone, Paul Hoffman, Murugiah P Souppaya
Abstract: Many organizations employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an organization s non-public computing resources. The nature ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685

162. Recommended Security Controls for Federal Information Systems and Organizations (*FINAL PUBLIC DRAFT* NIST SP 800-53, Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-53rev3
Topic: Cybersecurity
Published: 6/3/2009
Author: Ronald S Ross
Abstract: [This draft publication "went final" in August 2009: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy the breadth and depth of security requ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902743

163. Recommended Security Controls for Federal Information Systems and Organizations (*DRAFT* NIST SP 800-53, Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-53rev3
Topic: Cybersecurity
Published: 4/3/2009
Authors: Ronald S Ross, L Arnold Johnson, Marianne Swanson
Abstract: [This draft publication "went final" in August 2009: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy the breadth and depth of security requ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901509

164. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

165. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

166. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328

167. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901171

168. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

169. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

170. Guidelines on Cell Phone and PDA Security
Series: Special Publication (NIST SP)
Report Number: 800-124
Topic: Cybersecurity
Published: 11/3/2008
Authors: Wayne Jansen, Karen Ann Scarfone
Abstract: Cell phones and personal digital assistants (PDAs) have become indispensable tools for today's highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890048



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series