NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 11 to 20 of 221 records.
Resort by: Date / Title


11. United States Federal Employees' Password Management Behaviors ‹ a Department of Commerce case study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7991
Topic: Cybersecurity
Published: 4/8/2014
Authors: Yee-Yin Choong, Mary Frances Theofanos, Hung-Kung Liu
Abstract: Passwords are the most prevalent method used by the public and private sectors for controlling user access to systems. Organizations establish security policies and password requirements on how users should generate and maintain their passwords, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914843

12. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

13. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915826

14. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

15. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

16. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385

17. Report: Authentication Diary Study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7983
Topic: Cybersecurity
Published: 2/4/2014
Authors: Michelle Potts Steves, Mary Frances Theofanos
Abstract: Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same passwo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912430

18. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

19. The Importance of Entropy to Information Security
Topic: Cybersecurity
Published: 2/3/2014
Authors: Apostol T Vassilev, Timothy Hall
Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915121

20. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Topic: Cybersecurity
Published: 1/31/2014
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, resear ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914235



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series