NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 131 to 140 of 230 records.
Resort by: Date / Title


131. An Inconvenient Truth About Tunneled Authentications
Topic: Cybersecurity
Published: 10/10/2010
Authors: Katrin Hoeper, Lidong Chen
Abstract: In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks on such tunneled authentications have been discovered early on and cryptographic bindings ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906200

132. Guide to Securing WiMAX Wireless Communications
Series: Special Publication (NIST SP)
Report Number: 800-127
Topic: Cybersecurity
Published: 9/30/2010
Authors: Karen Ann Scarfone, Cyrus Tibbs, Matt Sexton
Abstract: The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless met ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906186

133. Guidelines for Smart Grid Cyber Security
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7628
Topic: Cybersecurity
Published: 8/31/2010
Author: Annabelle Lee
Abstract: [Superseded by NISTIR 7628 Rev. 1 (Sep. 2014), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916068] Smart Grid technologies will introduce millions of new intelligent components to the electric grid that communicate in much more advan ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906224

134. Introduction: Cybersecurity
Topic: Cybersecurity
Published: 8/31/2010
Author: David R Kuhn
Abstract: Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secur ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905995

135. Secure Domain Name System (DNS) Deployment Guide
Series: Special Publication (NIST SP)
Report Number: 800-81 Rev 1
Topic: Cybersecurity
Published: 8/27/2010
Author: Ramaswamy Chandramouli
Abstract: [Superseded by SP 800-81-2 (September 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914217] This document provides deployment guidelines for securing the Domain Name System (DNS) in any enterprise a government agency or a corp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113

136. Assessing the Effectiveness of Security Controls in Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans. The r ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906601

137. Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine
Topic: Cybersecurity
Published: 8/23/2010
Authors: Chung Tong Hu, David F Ferraiolo, Serban Ilie Gavrila
Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specifi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906086

138. PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 compliance)
Series: Special Publication (NIST SP)
Report Number: 800-85A-2
Topic: Cybersecurity
Published: 7/28/2010
Authors: Ramaswamy Chandramouli, Hildegard Ferraiolo, Ketan L Mehta
Abstract: The objective of this document is to provide test requirements and test assertions that could be used to validate the compliance/conformance of two PIV components: PIV middleware and PIV card application with the specification in NIST SP 800-73-3, In ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906167

139. Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-117
Topic: Cybersecurity
Published: 7/27/2010
Authors: Stephen D Quinn, Karen Ann Scarfone, Matthew P. Barrett, Christopher S. Johnson
Abstract: The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905179

140. Spectral Based Methods That Streamline the Search for Failure Scenarios in Large-Scale Distributed Systems
Topic: Cybersecurity
Published: 7/22/2010
Authors: Fern Y Hunt, Christopher E Dabrowski, Katherine Morrison
Abstract: We report our work on the development of analytical and numerical methods that enable the detection of failure scenarios in distributed grid computing, cloud computing and other large scale systems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907693



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series