NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 151 to 160 of 230 records.
Resort by: Date / Title


151. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-2
Topic: Cybersecurity
Published: 2/19/2010
Authors: William T Polk, Donna F Dodson, William Edward Burr
Abstract: [Superseded by SP 800-78-3 (December 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907537] This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201 as wel ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962

152. Interfaces for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-73-3
Topic: Cybersecurity
Published: 2/19/2010
Authors: Ramaswamy Chandramouli, David A Cooper, James F Dray Jr, Hildegard Ferraiolo, Scott Guthery, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, defines procedures for the PIV lifecycle activities including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201 also specifies that th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904797

153. A Model of Joint Congestion Control and Routing Through Random Assignment of Paths
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7590
Topic: Cybersecurity
Published: 2/16/2010
Authors: Fern Y Hunt, Vladimir V Marbukh
Abstract: We investigate the trade-off between utility and path diversity in a model of congestion control where there can be multiple routes between two locations in a network The model contains a random route allocation scheme for each source s (user or TCP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902537

154. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

155. Practical Interdomain Routing Security
Topic: Cybersecurity
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904041

156. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
Series: Special Publication (NIST SP)
Report Number: 800-126
Topic: Cybersecurity
Published: 11/5/2009
Authors: Stephen D Quinn, David Anthony Waltermire, Christopher S. Johnson, Karen Ann Scarfone, John Franklin Banghart
Abstract: This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates inf ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904075

157. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Topic: Cybersecurity
Published: 10/16/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904044

158. Small Business Information Security: the Fundamentals
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7621
Topic: Cybersecurity
Published: 10/1/2009
Author: Richard L Kissel
Abstract: For some small businesses, the security of their information, systems, and networks might not be a high priority, but for their customers, employees, and trading partners it is very important. The term Small Enterprise (or Small Organization) is som ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903080

159. National Checklist Program for IT Products Guidelines for Checklist Users and Developers
Series: Special Publication (NIST SP)
Report Number: 800-70 Rev 1
Topic: Cybersecurity
Published: 9/30/2009
Authors: Stephen D Quinn, Karen Ann Scarfone, Murugiah P Souppaya
Abstract: [Superseded by SP 800-70 Rev. 2 (February 2011): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907732] A security configuration checklist is a series of instructions for configuring a product to a particular operational environment. C ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901337

160. Guidelines on Firewalls and Firewall Policy
Series: Special Publication (NIST SP)
Report Number: 800-41rev1
Topic: Cybersecurity
Published: 9/28/2009
Authors: Karen Ann Scarfone, Paul Hoffman
Abstract: Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901083



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series