NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: date

Displaying records 31 to 40 of 244 records.
Resort by: Date / Title


31. A Profile of the Key Management Framework for the Federal Government
Series: ITL Bulletin
Topic: Cybersecurity
Published: 1/9/2014
Author: Elaine B Barker
Abstract: The Computer Security Division within ITL has recently provided a draft of Special Publication (SP) 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems, for public comment. NIST SP 800-152 is based on NIST SP 800-130, A Fram ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915268

32. A New Standard for Securing Media-Independent Handover: IEEE 802.21a
Topic: Cybersecurity
Published: 12/31/2013
Authors: Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
Abstract: When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914725

33. WS-Biometric Devices
Topic: Cybersecurity
Published: 12/17/2013
Authors: Kevin C Mangold, Ross J Micheals
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914479

34. Taxonomic Rules for Password Policies: Translating the Informal to the Formal Language
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7970
Topic: Cybersecurity
Published: 12/9/2013
Authors: Kevin Killourhy, Yee-Yin Choong, Mary Frances Theofanos
Abstract: A password policy may seem formal in the sense that it is written in a legalistic language, giving the impression of a binding contract. However, such policies are informal in the logical sense that the policy statements are not written in a clear, u ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914627

35. ITL Releases Preliminary Cybersecurity Framework
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/4/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletin announces the release of the Preliminary Cybersecurity Framework and gives instructions for submitting comments.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914990

36. Smart Grid Mesh Network Security Using Dynamic Key Distribution with Merkle Tree 4-Way Handshaking
Topic: Cybersecurity
Published: 10/13/2013
Author: Hamid Gharavi
Abstract: Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper i ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914747

37. Cryptographic Key Management Issues & Challenges in Cloud Services
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7956
Topic: Cybersecurity
Published: 9/18/2013
Authors: Ramaswamy Chandramouli, Michaela Iorga, Santosh Chokhani
Abstract: To interact with various services in the cloud and to store the data generated/processed by those services, several security capabilities are required. Based on a core set of features in the three common cloud services - Infrastructure as a Service ( ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914304

38. A Framework for Designing Cryptographic Key Management Systems
Series: Special Publication (NIST SP)
Report Number: 800-130
Topic: Cybersecurity
Published: 8/15/2013
Authors: Elaine B Barker, Miles Smid, Dennis Branstad, Santosh Chokhani
Abstract: This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that n ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914228

39. An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
Topic: Cybersecurity
Published: 7/31/2013
Authors: M. Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang
Abstract: Computer systems are vulnerable to both known and zero-day attacks. Although known attack patterns can be easily modeled, thus enabling the definition of suitable hardening strategies, handling zero-day vulnerabilities is inherently difficult due to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913051

40. Computer Security Division 2012 Annual Report
Series: Special Publication (NIST SP)
Report Number: 800-165
Topic: Cybersecurity
Published: 7/22/2013
Author: Patrick D O'Reilly
Abstract: Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913996



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series