NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 151 to 160 of 221 records.
Resort by: Date / Title


151. Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit
Topic: Cybersecurity
Published: 2/3/2014
Authors: Chung Tong Hu, Karen Scarfone
Abstract: Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915399

152. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode (NIST SP 800-38A)
Series: Special Publication (NIST SP)
Report Number: 800-38
Topic: Cybersecurity
Published: 10/21/2010
Author: Morris J Dworkin
Abstract: A limitation to Cipher Block Chaining (CBC) mode, as specified in NIST Special Publication 800-38A, is that the plaintext input must consist of a sequence of blocks. Ciphertext stealing is a padding method in which the required padding bits are "sto ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906929

153. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

154. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

155. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342

156. Recommendation for Key Management - Part 2: Best Practices for Key Management Organization
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 8/25/2005
Authors: William C Barker, Elaine B Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: Best Practices for Key Management Organization, Part 2 of the Recommendation for Key Management is intended primarily to address the needs of system owners and managers. It provides context, principles, and implementation guidelines to assist in imp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151315

157. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

158. Recommendation for Obtaining Assurances for Digital Signature Applications
Series: Special Publication (NIST SP)
Report Number: 800-89
Topic: Cybersecurity
Published: 11/30/2006
Author: Elaine B Barker
Abstract: Entities participating in the generation or verification of digital signatures depend on the authenticity of the process. This Recommendation specifies methods for obtaining the assurances necessary for valid digital signatures: assurance of domain p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50954

159. Recommended Security Controls for Federal Information Systems and Organizations (*DRAFT* NIST SP 800-53, Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-53rev3
Topic: Cybersecurity
Published: 4/3/2009
Authors: Ronald S Ross, L Arnold Johnson, Marianne Swanson
Abstract: [This draft publication "went final" in August 2009: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy the breadth and depth of security requ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901509

160. Recommended Security Controls for Federal Information Systems and Organizations (*FINAL PUBLIC DRAFT* NIST SP 800-53, Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-53rev3
Topic: Cybersecurity
Published: 6/3/2009
Author: Ronald S Ross
Abstract: [This draft publication "went final" in August 2009: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903280] The objective of NIST SP 800-53 is to provide a set of security controls that can satisfy the breadth and depth of security requ ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902743



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series