NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 201 to 210 of 244 records.
Resort by: Date / Title


201. Handling Computer Security Incidents: NIST Issues Updated Guidelines
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/27/2008
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Written by Karen Scarfone and Tim ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152110

202. Secure Biometric Match-on-Card Feasibility Report
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7452
Topic: Cybersecurity
Published: 11/30/2007
Authors: David A Cooper, Trung-Hung Dang, Philip Lee, William I. MacGregor, Ketan Mehta
Abstract: FIPS 201, "Personal Identity Verification (PIV) of Federal Employees and Contractors," and its associated special publications define a method to perform biometric match-off-card authentication of a PIV cardholder when the PIV card is inserted into ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51278

203. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
Series: Special Publication (NIST SP)
Report Number: 800-38D
Topic: Cybersecurity
Published: 11/28/2007
Author: Morris J Dworkin
Abstract: This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51288

204. User's Guide to Securing External Devices for Telework and Remote Access
Series: Special Publication (NIST SP)
Report Number: 800-114
Topic: Cybersecurity
Published: 11/1/2007
Authors: Karen Ann Scarfone, Murugiah P Souppaya
Abstract: This publication helps teleworkers secure the external devices they use for telework, such as personally owned and privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants [PDA]). The document ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151340

205. Metastability of Fair Bandwidth Sharing Under Fluctuating Demand and Necessity of Flow Admission control
Topic: Cybersecurity
Published: 9/17/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions under random flow arrivals/departures is proposed and discussed. Fluctuations in the numbers of flows in progress cause the network instability even under light load. Th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51233

206. Fair Bandwidth Sharing Under Flow Arrivals/Departures: Effect of Retransmissions on Stability and Performance
Topic: Cybersecurity
Published: 9/1/2007
Author: Vladimir V Marbukh
Abstract: A flow-level Markov model for fair bandwidth sharing with packet retransmissions and random flow arrivals/departures is proposed. The model accounts for retransmissions by assuming that file transfer rates are determined by the end-to-end goodputs ra ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51246

207. Where EAP Security Claims Fail
Topic: Cybersecurity
Published: 8/14/2007
Authors: Katrin Hoeper, Lei Chen
Abstract: The Extensible Authentication Protocol (EAP) is widely used as an authentication framework to control the access to wireless networks, e.g. in IEEE 802.11 and IEEE 802.16 networks. In this paper, we discuss limitations of EAP security and demonstrate ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51151

208. Cryptographic Algorithms and Key Sizes for Personal Identity Verification
Series: Special Publication (NIST SP)
Report Number: 800-78-1
Topic: Cybersecurity
Published: 8/1/2007
Authors: William T Polk, Donna F Dodson, William E. (William E.) Burr
Abstract: [Superseded by SP 800-78-2(February 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904962] SP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51215

209. Conformance Checking of Access Control Policies Specified in XACML
Topic: Cybersecurity
Published: 7/24/2007
Authors: Chung Tong Hu, Evan Martin, Tao Xie
Abstract: Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51160

210. Access Control Policy Combinations for the Grid Using the Policy Machine
Topic: Cybersecurity
Published: 5/14/2007
Authors: Chung Tong Hu, David F Ferraiolo, Karen Ann Scarfone
Abstract: Many researchers have tackled the architecture and requirements aspects of grid security, concentrating on the authentication or authorization mediation instead of authorization techniques, especially the topic of policy combination. Policy combinati ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50948



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series