NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 21 to 30 of 210 records.
Resort by: Date / Title


21. Attribute Based Access Control (ABAC) Definition and Considerations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 3/7/2014
Author: Chung Tong Hu
Abstract: Attribute-Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, env ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915660

22. BIOS Protection Guidelines
Series: Special Publication (NIST SP)
Report Number: 800-147
Topic: Cybersecurity
Published: 4/29/2011
Authors: David A Cooper, William T Polk, Andrew Richard Regenscheid, Murugiah P Souppaya
Abstract: This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908423

23. Basing Cybersecurity Training on User Perceptions
Topic: Cybersecurity
Published: 4/2/2012
Author: Susanne M Furman
Abstract: The National Initiative for Cybersecurity Education (NICE) will be conducting a nationwide awareness and outreach program to effect behavioral change. To be effective, an educational campaign must first understand users‰ perceptions of computer and ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909994

24. Biometrics in a Networked World
Topic: Cybersecurity
Published: 12/2/2012
Author: Kevin C Mangold
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911889

25. Building Security into Off-the-Shelf Smartphones
Topic: Cybersecurity
Published: 2/1/2012
Authors: Angelos Stavrou, Jeffrey Mark Voas, Athanasios T Karygiannis, Stephen Quirolgico
Abstract: Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909685

26. Can TCP Metastability Explain Cascading Failures and Justify Flow Admission Control in the Internet?
Topic: Cybersecurity
Published: 6/2/2008
Author: Vladimir V Marbukh
Abstract: This paper discusses implications of possible metastability of TCP-type fair bandwidth sharing under random flow arrivals/departures for understanding and defending the Internet against cascading failures.  Cascading failures can be viewed as a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152132

27. Challenging Security Requirements for US Government Cloud Computing Adoption
Topic: Cybersecurity
Published: 11/27/2012
Author: Michaela Iorga
Abstract: The Federal Cloud Strategy, February 8, 2010, outlines a federal cloud computing program that identifies program objectives aimed at accelerating the adoption of cloud computing across the federal government. NIST, along with other agencies, was task ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912695

28. Cloud Computing Synopsis and Recommendations
Series: Special Publication (NIST SP)
Report Number: 800-146
Topic: Cybersecurity
Published: 5/29/2012
Authors: Mark L Badger, Timothy Grance, Robert Patt-Corner, Jeffrey Mark Voas
Abstract: This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911075

29. Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations
Series: ITL Bulletin
Topic: Cybersecurity
Published: 6/27/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911668

30. Cloud Service Feature Driven Security Policies for Virtualized Infrastructures
Topic: Cybersecurity
Published: 7/19/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908387



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series