NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 11 to 20 of 220 records.
Resort by: Date / Title


11. NIST and Computer Security
Topic: Cybersecurity
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

12. SATE V Ockham Sound Analysis Criteria
Topic: Cybersecurity
Published: 3/14/2014
Author: Paul E Black
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915826

13. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

14. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476

15. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0
Topic: Cybersecurity
Published: 2/12/2014
Author: Adam Sedgewick
Abstract: The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915385

16. Report: Authentication Diary Study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7983
Topic: Cybersecurity
Published: 2/4/2014
Authors: Michelle Potts Steves, Mary Frances Theofanos
Abstract: Users have developed various coping strategies for minimizing or avoiding the friction and burden associated with managing and using their portfolios of user IDs and passwords or personal identification numbers (PINs). Many try to use the same passwo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912430

17. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

18. The Importance of Entropy to Information Security
Topic: Cybersecurity
Published: 2/3/2014
Authors: Apostol T Vassilev, Timothy Hall
Abstract: The strength of cryptographic keys is an active challenge in academic research and industrial practice. In this paper we discuss the entropy as fundamentally important concept for generating hard-to-guess, i.e., strong, cryptographic keys and outline ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915121

19. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
Topic: Cybersecurity
Published: 1/31/2014
Authors: Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
Abstract: By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, resear ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914235

20. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series