NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 201 to 210 of 230 records.
Resort by: Date / Title


201. Where EAP Security Claims Fail
Topic: Cybersecurity
Published: 8/14/2007
Authors: Katrin Hoeper, Lei Chen
Abstract: The Extensible Authentication Protocol (EAP) is widely used as an authentication framework to control the access to wireless networks, e.g. in IEEE 802.11 and IEEE 802.16 networks. In this paper, we discuss limitations of EAP security and demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51151

202. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-1
Topic: Cybersecurity
Published: 8/1/2007
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: [Superseded by SP 800-78-2(February 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962] SP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51215

203. Conformance Checking of Access Control Policies Specified in XACML
Topic: Cybersecurity
Published: 7/24/2007
Authors: Chung Tong Hu, Evan Martin, Tao Xie
Abstract: Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51160

204. Access Control Policy Combinations for the Grid Using the Policy Machine
Topic: Cybersecurity
Published: 5/14/2007
Authors: Chung Tong Hu, David F Ferraiolo, Karen Ann Scarfone
Abstract: Many researchers have tackled the architecture and requirements aspects of grid security, concentrating on the authentication or authorization mediation instead of authorization techniques, especially the topic of policy combination. Policy combinati ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50948

205. Computer Security Division 2006 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7399
Topic: Cybersecurity
Published: 3/21/2007
Authors: Tanya L Brewer, Kevin Mcguire Stine
Abstract: This report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during the Fiscal Year 2006. It discusses all projects and programs within the Division, staff highlights, and publications. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51133

206. Recommendation for Pair-Wise Key Establishment Using Discrete Logarithm Cryptography (Revised)
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev
Topic: Cybersecurity
Published: 3/14/2007
Authors: Elaine B Barker, Don Johnson, Miles E. Smid
Abstract: [Superseded by SP 800-56A Rev. 2 (May 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913431] This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150618

207. Guide to Intrusion Detection and Prevention Systems (IDPS)
Series: Special Publication (NIST SP)
Report Number: 800-94
Topic: Cybersecurity
Published: 2/20/2007
Authors: Karen Ann Scarfone, Peter M Mell
Abstract: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50951

208. Recommendation for Obtaining Assurances for Digital Signature Applications
Series: Special Publication (NIST SP)
Report Number: 800-89
Topic: Cybersecurity
Published: 11/30/2006
Author: Elaine B Barker
Abstract: Entities participating in the generation or verification of digital signatures depend on the authenticity of the process. This Recommendation specifies methods for obtaining the assurances necessary for valid digital signatures: assurance of domain p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50954

209. Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist
Series: Special Publication (NIST SP)
Report Number: 800-69
Topic: Cybersecurity
Published: 9/29/2006
Authors: Karen Kent Scarfone, Murugiah P Souppaya, John Connor
Abstract: The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50890

210. Guidelines for Media Sanitization
Series: Special Publication (NIST SP)
Report Number: 800-88
Topic: Cybersecurity
Published: 9/1/2006
Authors: Richard L Kissel, Matthew A Scholl, Steven Skolochenko, Xiang Li
Abstract: Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may r ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50819



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series