NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 201 to 210 of 236 records.
Resort by: Date / Title


201. Specification for Asset Identification 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7693
Topic: Cybersecurity
Published: 6/17/2011
Authors: David Anthony Waltermire, John Wunder, Adam Halbardier
Abstract: Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908482

202. Specification for WS-Biometric Devices (WS-BD)
Series: Special Publication (NIST SP)
Report Number: 500-288
Topic: Cybersecurity
Published: 3/14/2012
Authors: Ross J Micheals, Kevin C Mangold, Matthew L Aronoff, Kayee Kwong, Karen Marshall
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910334

203. Specification for the Asset Reporting Format 1.1
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7694
Topic: Cybersecurity
Published: 6/21/2011
Authors: David Anthony Waltermire, Adam Halbardier, Mark Johnson
Abstract: This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, corre ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908483

204. Specification for the Open Checklist Interactive Language (OCIL) Version 2.0
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7692
Topic: Cybersecurity
Published: 4/7/2011
Authors: David Anthony Waltermire, Karen Scarfone, Maria Casipe
Abstract: This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing questionnaires and related information, such as answers to questions and final questionnaire resul ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907944

205. Specification of Attribute Relations for Access Control Policies and Constraints Using Policy Machine
Topic: Cybersecurity
Published: 8/23/2010
Authors: Chung Tong Hu, David F Ferraiolo, Serban Ilie Gavrila
Abstract: Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today s de-facto access control protocol and specifi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906086

206. Spectral Based Methods That Streamline the Search for Failure Scenarios in Large-Scale Distributed Systems
Topic: Cybersecurity
Published: 7/22/2010
Authors: Fern Y Hunt, Christopher E Dabrowski, Katherine Morrison
Abstract: We report our work on the development of analytical and numerical methods that enable the detection of failure scenarios in distributed grid computing, cloud computing and other large scale systems.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907693

207. Static Analysis Tool Exposition (SATE) 2008
Series: Special Publication (NIST SP)
Report Number: 500-279
Topic: Cybersecurity
Published: 6/22/2009
Authors: Vadim Okun, Romain Gaucher, Paul E Black
Abstract: The NIST SAMATE project conducted the first Static Analysis Tool Exposition (SATE) in 2008 to advance research in static analysis tools that find security defects in source code. The main goals of SATE were to enable empirical research based on large ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902679

208. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Cybersecurity
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095

209. Surviving Insecure IT: Effective Patch Management
Topic: Cybersecurity
Published: 3/21/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repe ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901613

210. Targeted Search: Reducing the Time and Cost for Searching for Objects in Multi-Server Networks
Topic: Cybersecurity
Published: 4/9/2006
Author: Allen L Roginsky
Abstract: In many applications - including P2P file sharing, content distribution networks, and grid computing - a single object will be searched for in multiple servers. In this paper, we find the provably optimal search method for such applications and deve ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150231



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series