NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 141 to 150 of 230 records.
Resort by: Date / Title


141. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201-1
Topic: Cybersecurity
Published: 6/26/2006
Authors: William I. MacGregor, Ketan Mehta
Abstract: [Superseded by FIPS 201-2(August 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914530] This document was developed to satisfy the requirements of HSPD-12, approved by the Secretary of Commerce, and issued on March 2006. This cha ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836

142. Personal Identity Verification (PIV) of Federal Employees and Contractors
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 201
Topic: Cybersecurity
Published: 2/1/2005
Authors: William C Barker, James F Dray Jr, Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T Polk, Donna F Dodson, Ketan L Mehta, S Gupta, William Edward Burr, Timothy Grance
Abstract: [Superseded by FIPS 201-1 (March 2006): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50836] FIPS 201 specifies the technical and operational requirements for interoperable PIV systems that issue smart cards as identification credentia ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150207

143. Policy Specification and Enforcement for Smart ID Cards Deployment
Topic: Cybersecurity
Published: 6/3/2008
Author: Ramaswamy Chandramouli
Abstract: Deployment of Smart Cards for Identity Verification requires collection of credentials and provisioning of credentials from and to heterogeneous and sometimes legacy systems. To facilitate this process, a centralized identity store called Identity Ma ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152096

144. Practical Combinatorial Testing: Beyond Pairwise
Topic: Cybersecurity
Published: 6/1/2008
Authors: David R Kuhn, Yu Lei, Raghu N Kacker
Abstract: With new algorithms and tools, developers can apply high-strength combinatorial testing to detect elusive failures that occur only when multiple components interact. In pairwise testing, all possible pairs of parameter values are covered by at least ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152161

145. Practical Interdomain Routing Security
Topic: Cybersecurity
Published: 11/20/2009
Authors: David R Kuhn, Simon Liu, Hart Rossman
Abstract: This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce rou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904041

146. Practices for Managing Supply Chain Risks to Protect Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NISTIR 7622, Notional Supply Chain Risk Management Practices for Federal Information Systems. This publication provides federal departments and agencies with a notional set of repeatable an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912849

147. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

148. Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 ‹ 24, 2012
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7916
Topic: Cybersecurity
Published: 2/15/2013
Author: Tanya L Brewer
Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop,April 23 ‹ 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive veh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911946

149. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328

150. Protecting Industrial Control Systems - Key Components of our Nation's Critical Infrastructures
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/24/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology. The publication was written by Keith Stou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909380



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series