NIST logo

Publications Portal

You searched on: Topic Area: Cybersecurity

Displaying records 61 to 70 of 118 records.
Resort by: Date / Title


61. Specification for the Asset Reporting Format 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7694
Topic: Cybersecurity
Published: 6/21/2011
Authors: David Anthony Waltermire, Adam Halbardier, Mark Johnson
Abstract: This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, corre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908483

62. Specification for Asset Identification 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7693
Topic: Cybersecurity
Published: 6/17/2011
Authors: David Anthony Waltermire, John Wunder, Adam Halbardier
Abstract: Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908482

63. Computer Security Division 2010 Annual Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7751
Topic: Cybersecurity
Published: 5/31/2011
Author: Patrick D O'Reilly
Abstract: This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publication ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908416

64. Encryption Basics
Topic: Cybersecurity
Published: 5/2/2011
Authors: Kevin Mcguire Stine, Quynh H Dang
Abstract: Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to c ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908084

65. Specification for the Open Checklist Interactive Language (OCIL) Version 2.0
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7692
Topic: Cybersecurity
Published: 4/7/2011
Authors: David Anthony Waltermire, Karen Scarfone, Maria Casipe
Abstract: This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing questionnaires and related information, such as answers to questions and final questionnaire resul ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907944

66. The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement
Topic: Cybersecurity
Published: 4/1/2011
Authors: David F Ferraiolo, Vijay (Vijay) Atluri, Serban Ilie Gavrila
Abstract: The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905440

67. Thoughts on Higher Education and Scientific Research
Topic: Cybersecurity
Published: 3/22/2011
Authors: Jeffrey Mark Voas, George Hurlburt, Keith Miller, Phillip Laplante, Bret Michael
Abstract: The notion of a "tipping point" isn't new, al though the concept has relevance in differing ways. Academia seems to be at a tipping point, whereby the steady state of disciplinary specialization is about to give way to an interdisciplinary, collabora ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906871

68. It's All About The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice
Topic: Cybersecurity
Published: 2/28/2011
Authors: Serge M. (Serge) Egelman, Nicolas Christin, Timothy Vidas, Jens Grossklags
Abstract: We examine the cost for an attacker to pay users to execute arbitrary code---potentially malware. We created an Amazon's Mechanical Turk task wherein users were asked to download and run for an hour an executable we wrote. While this program was ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907421

69. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 2
Topic: Cybersecurity
Published: 2/25/2011
Authors: Stephen D Quinn, Murugiah P Souppaya, Melanie Cook, Karen Scarfone
Abstract: Special Publication 800-70 Revision 2 - National Checklist Program for IT Products Guidelines for Checklist Users and Developers describes security configuration checklists and their benefits, and it explains how to use the NIST National Checklist Pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732

70. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1
Series: Special Publication (NIST SP)
Report Number: 800-126 Rev 1
Topic: Cybersecurity
Published: 2/25/2011
Authors: David Anthony Waltermire, Stephen D Quinn, Karen Scarfone
Abstract: This document provides the definitive technical specification for Version 1.1 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software comm ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907893



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series