NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 191 to 200 of 240 records.
Resort by: Date / Title


191. A Framework for Measuring the Vulnerability of Hosts
Topic: Cybersecurity
Published: 6/30/2008
Authors: Karen Ann Scarfone, Timothy Grance
Abstract: This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152092

192. Policy Specification and Enforcement for Smart ID Cards Deployment
Topic: Cybersecurity
Published: 6/3/2008
Author: Ramaswamy Chandramouli
Abstract: Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Ma ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152096

193. Can TCP Metastability Explain Cascading Failures and Justify Flow Admission Control in the Internet?
Topic: Cybersecurity
Published: 6/2/2008
Author: Vladimir V Marbukh
Abstract: This paper discusses implications of possible metastability of TCP-type fair bandwidth sharing under random flow arrivals/departures for understanding and defending the Internet against cascading failures.  Cascading failures can be viewed as a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152132

194. Practical Combinatorial Testing: Beyond Pairwise
Topic: Cybersecurity
Published: 6/1/2008
Authors: David R Kuhn, Yu Lei, Raghu N Kacker
Abstract: With new algorithms and tools, developers can apply high-strength combinatorial testing to detect elusive failures that occur only when multiple components interact. In pairwise testing, all possible pairs of parameter values are covered by at least ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152161

195. New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/28/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152172

196. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906396

197. Computer Security Division 2007 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7442
Topic: Cybersecurity
Published: 4/1/2008
Authors: Kevin Mcguire Stine, Mark Wilson
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150677

198. Handling Computer Security Incidents: NIST Issues Updated Guidelines
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/27/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Written by Karen Scarfone and Tim ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152110

199. Secure Biometric Match-on-Card Feasibility Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7452
Topic: Cybersecurity
Published: 11/30/2007
Authors: David A Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51278

200. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
Series: Special Publication (NIST SP)
Report Number: 800-38D
Topic: Cybersecurity
Published: 11/28/2007
Author: Morris J Dworkin
Abstract: This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51288



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series