NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 151 to 160 of 240 records.
Resort by: Date / Title


151. Practices for Managing Supply Chain Risks to Protect Federal Information Systems
Series: ITL Bulletin
Topic: Cybersecurity
Published: 11/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information that is included in NISTIR 7622, Notional Supply Chain Risk Management Practices for Federal Information Systems. This publication provides federal departments and agencies with a notional set of repeatable an ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912849

152. Privacy & Authorization Policies - Validation & Assurance Techniques (Two Chapters for a book, Identity and Policy, by FutureText)
Topic: Cybersecurity
Published: 12/19/2008
Author: Ramaswamy Chandramouli
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152171

153. Proceedings of the Cybersecurity in Cyber-Physical Workshop, April 23 ‹ 24, 2012
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7916
Topic: Cybersecurity
Published: 2/15/2013
Author: Tanya L Brewer
Abstract: Proceedings of the Cybersecurity in Cyber-Physical Workshop,April 23 ‹ 24, 2012, complete with abstracts and slides from presenters. Some of the cyber-physical systems covered during the first day of the workshop included networked automotive veh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911946

154. Property Verification for Generic Access Control Models
Topic: Cybersecurity
Published: 12/20/2008
Authors: Chung Tong Hu, David R Kuhn, Tao Xie
Abstract: To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new ge ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51328

155. Protecting Industrial Control Systems - Key Components of our Nation's Critical Infrastructures
Series: ITL Bulletin
Topic: Cybersecurity
Published: 8/24/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems Security: Recommendations of the National Institute of Standards and Technology. The publication was written by Keith Stou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909380

156. Protecting Wireless Local Area Networks
Topic: Cybersecurity
Published: 12/3/2012
Authors: Shirley M. Radack, David R Kuhn
Abstract: This article summarizes the information that was presented in the February 2012 Information Technology Laboratory (ITL) bulletin, Guidelines for Securing Wireless Local Area Networks (WLANs). The bulletin, which was noted by WERB in February 2012, wa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912594

157. Quantifying Network Topology Robustness Under Budget Constraints
Topic: Cybersecurity
Published: 6/24/2013
Authors: Assane Gueye, Aron Lazska
Abstract: To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A netw ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912970

158. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network
Topic: Cybersecurity
Published: 10/16/2009
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904044

159. Randomized Hashing for Digital Signatures
Series: Special Publication (NIST SP)
Report Number: 800-106
Topic: Cybersecurity
Published: 2/25/2009
Author: Quynh H Dang
Abstract: NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved cryptographic hash functions and digital signature algorithms can be found in FIPS 180-3, ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901182

160. Randomness Testing of the Advanced Encryption Standard Finalist Candidates
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6483
Topic: Cybersecurity
Published: 4/1/2000
Authors: Juan Soto, Lawrence E Bassham
Abstract: Mars, RC6, Rijndael, Serpent and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' suitability as random number generators, empirical statistical testing is commonly employed. Although it widely ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151216



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series