NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 201 to 210 of 254 records.
Resort by: Date / Title

201. Performance Measurement Guide for Information Security
Series: Special Publication (NIST SP)
Report Number: 800-55 Rev 1
Topic: Cybersecurity
Published: 7/16/2008
Authors: Elizabeth Chew, Marianne M. Swanson, Kevin Mcguire Stine, N Bartol, Anthony Brown, W Robinson
Abstract: This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional secur ...

202. Dynamic Routing and Congestion Control Through Random Assignment of Routes
Topic: Cybersecurity
Published: 7/15/2008
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We introduce an algorithm for maximizing utility through congestion control and random allocation of routes to users. The allocation is defined by a probability distribution whose degree of randomness as measured by its entropy, is controlled. We se ...

203. Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
Series: Special Publication (NIST SP)
Report Number: 800-53A
Topic: Cybersecurity
Published: 7/1/2008
Authors: Ronald S Ross, L A. Johnson, Stuart William Katzke, Patricia R Toth, G. Stoneburner, G Rogers
Abstract: [Superseded by NIST SP 800-53A, Rev. 1 (June 2010):] The purpose of NIST Special Publication 800-53A is to provide guidelines for building effective security assessment plans and pro ...

204. A Framework for Measuring the Vulnerability of Hosts
Topic: Cybersecurity
Published: 6/30/2008
Authors: Karen Ann Scarfone, Timothy Grance
Abstract: This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually c ...

205. Policy Specification and Enforcement for Smart ID Cards Deployment
Topic: Cybersecurity
Published: 6/3/2008
Author: Ramaswamy Chandramouli
Abstract: Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Ma ...

206. Can TCP Metastability Explain Cascading Failures and Justify Flow Admission Control in the Internet?
Topic: Cybersecurity
Published: 6/2/2008
Author: Vladimir V Marbukh
Abstract: This paper discusses implications of possible metastability of TCP-type fair bandwidth sharing under random flow arrivals/departures for understanding and defending the Internet against cascading failures.  Cascading failures can be viewed as a ...

207. Practical Combinatorial Testing: Beyond Pairwise
Topic: Cybersecurity
Published: 6/1/2008
Authors: David R Kuhn, Yu Lei, Raghu N Kacker
Abstract: With new algorithms and tools, developers can apply high-strength combinatorial testing to detect elusive failures that occur only when multiple components interact. In pairwise testing, all possible pairs of parameter values are covered by at least ...

208. New Cryptographic Hash Algorithm Family: NIST Holds a Public Competition to Find New Algorithms
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/28/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in a November 2007 Federal Register Notice. NIST is soliciting candidates for a new and robust cryptographic hash algorithm f ...

209. Managing Risk from Information Systems - Second Public Draft
Series: Special Publication (NIST SP)
Report Number: 800-39
Topic: Cybersecurity
Published: 4/9/2008
Authors: Ronald S Ross, Stuart William Katzke, Marianne M. Swanson, L A. Johnson, G Stoneburner

210. Computer Security Division 2007 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7442
Topic: Cybersecurity
Published: 4/1/2008
Authors: Kevin Mcguire Stine, Mark Wilson
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series