NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity

Displaying records 51 to 60 of 210 records.
Resort by: Date / Title


51. Cloud Computing Synopsis and Recommendations
Series: Special Publication (NIST SP)
Report Number: 800-146
Topic: Cybersecurity
Published: 5/29/2012
Authors: Mark L Badger, Timothy Grance, Robert Patt-Corner, Jeffrey Mark Voas
Abstract: This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075

52. Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS) 180-4
Series: ITL Bulletin
Topic: Cybersecurity
Published: 5/9/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Co ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911344

53. Computer Security Division 2011 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7816
Topic: Cybersecurity
Published: 5/8/2012
Author: Patrick D O'Reilly
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910504

54. Adaptive Preimage Resistance Analysis Revisited: Requirements, Subtleties and Implications
Topic: Cybersecurity
Published: 4/16/2012
Authors: Dong H. Chang, Moti Yung
Abstract: In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906235

55. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Author: Susanne M Furman
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909994

56. Guidelines for Improving Security and Privacy in Public Cloud Computing
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/28/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-144, Guidelines on Security and Privacy in Public Cloud Computing. These new guidelines, which were written by Wayne Jansen of Booz Allen Hamilton and Tim Grance ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911064

57. Improved Indifferentiability Security Bound for the JH Mode
Topic: Cybersecurity
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel Smith
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702

58. Specification for WS-Biometric Devices (WS-BD)
Series: Special Publication (NIST SP)
Report Number: 500-288
Topic: Cybersecurity
Published: 3/14/2012
Authors: Ross J Micheals, Kevin C Mangold, Matthew L Aronoff, Kayee Kwong, Karen Marshall
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910334

59. Guidelines for Securing Wireless Local Area Networks (WLANs)
Series: ITL Bulletin
Topic: Cybersecurity
Published: 2/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. The publication was wri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910705

60. Guidelines for Securing Wireless Local Area Networks (WLANs)
Series: Special Publication (NIST SP)
Report Number: 800-153
Topic: Cybersecurity
Published: 2/21/2012
Authors: Murugiah P Souppaya, Karen Ann Scarfone
Abstract: A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910174



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series