NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 131 to 140 of 221 records.
Resort by: Date / Title


131. Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine
Topic: Cybersecurity
Published: 8/23/2010
Authors: Chung Tong Hu, David F Ferraiolo, Serban Ilie Gavrila
Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specifi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906086

132. NIST SP 800-85A-2: PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85
Topic: Cybersecurity
Published: 7/28/2010
Authors: Ramaswamy Chandramouli, Hildegard Ferraiolo, Ketan L Mehta
Abstract: The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components: PIV middleware and PIV card application with the specification in NIST SP 800-73-3, In ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906167

133. Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-117
Topic: Cybersecurity
Published: 7/27/2010
Authors: Stephen D Quinn, Karen Ann Scarfone, Matthew P. Barrett, Christopher S. Johnson
Abstract: The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905179

134. Spectral Based Methods That Streamline the Search for Failure Scenarios in Large-Scale Distributed Systems
Topic: Cybersecurity
Published: 7/22/2010
Authors: Fern Y Hunt, Christopher E Dabrowski, Katherine Morrison
Abstract: We report our work on the development of analytical and numerical methods that enable the detection of failure scenarios in distributed grid computing, cloud computing and other large scale systems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907693

135. Contingency Planning for Information Systems: Updated Guide for Federal Organizations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 7/20/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems. This publication updates federal contingency planning practices by integrating risk manag ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906210

136. The Second Static Analysis Tool Exposition (SATE) 2009
Series: Special Publication (NIST SP)
Report Number: 500-287
Topic: Cybersecurity
Published: 7/2/2010
Authors: Vadim Okun, Paul E Black, Aurelien Michel Dominique Delaitre
Abstract: The NIST SAMATE project conducted the second Static Analysis Tool Exposition (SATE) in 2009 to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on larg ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905879

137. Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans (NIST SP 800-53A, Revision 1)
Series: Special Publication (NIST SP)
Report Number: 800-53
Topic: Cybersecurity
Published: 6/29/2010
Authors: Ronald S Ross, L Arnold Johnson
Abstract: Special Publication 800-53A, Revision 1 provides guidelines for developing security assessment plans and associated security control assessment procedures that are consistent with Special Publication 800-53, Revision 3, Recommended Security Controls ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906065

138. Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7676
Topic: Cybersecurity
Published: 6/18/2010
Author: David A Cooper
Abstract: NIST Special Publication 800-73-3 introduces the ability to store retired Key Management Keys within the Personal Identity Verification (PIV) Card Application on a PIV Card. This paper complements SP 800-73-3 by providing some of the rationale for t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905913

139. Contingency Planning Guide for Federal Information Systems
Series: Special Publication (NIST SP)
Report Number: 800-34 rev 1
Topic: Cybersecurity
Published: 6/8/2010
Authors: Marianne Swanson, Pauline Bowen, Wohl Phillips Amy, Dean Gallup, David Lynes
Abstract: This publication assists organizations in understanding the purpose, process, and format of information system contingency planning development through practical, real-world guidelines. This guidance document provides background information on inter ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905266

140. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Series: Special Publication (NIST SP)
Report Number: 800-122
Topic: Cybersecurity
Published: 4/6/2010
Authors: Erika McCallister, Timothy Grance, Karen Ann Scarfone
Abstract: The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the con ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904990



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series