NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 181 to 190 of 255 records.
Resort by: Date / Title


181. Recommended Security Controls for Federal Information Systems and Organizations
Series: Special Publication (NIST SP)
Report Number: 800-53 Rev 3
Topic: Cybersecurity
Published: 8/3/2009
Author: Ronald S Ross
Abstract: **Includes updates through 5/1/2010. [Superseded by NIST SP 800-53, Rev. 4 (April 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913693] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280

182. Fast and Secure CBC Type MAC Algorithms
Topic: Cybersecurity
Published: 7/21/2009
Author: Mridul Nandi
Abstract: The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901030

183. Digital Signature Standard (DSS)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 186-3
Topic: Cybersecurity
Published: 6/25/2009
Author: Elaine B Barker
Abstract: [Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthori ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984

184. Static Analysis Tool Exposition (SATE) 2008
Series: Special Publication (NIST SP)
Report Number: 500-279
Topic: Cybersecurity
Published: 6/22/2009
Authors: Vadim Okun, Romain Gaucher, Paul E Black
Abstract: The NIST SAMATE project conducted the first Static Analysis Tool Exposition (SATE) in 2008 to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902679

185. Guide to Enterprise Telework and Remote Access Security
Series: Special Publication (NIST SP)
Report Number: 800-46 Rev 1
Topic: Cybersecurity
Published: 6/16/2009
Authors: Karen Ann Scarfone, Paul Hoffman, Murugiah P Souppaya
Abstract: Many organizations employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an organization s non-public computing resources. The nature ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902685

186. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

187. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

188. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328

189. A Threat Analysis on UOCAVA Voting Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7551
Topic: Cybersecurity
Published: 12/19/2008
Authors: Andrew Richard Regenscheid, Nelson E Hastings
Abstract: This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ball ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901171

190. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series